dasel
Pass
Audited by Gen Agent Trust Hub on Apr 16, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The skill instructs the agent to interact with the
daselCLI utility using shell commands, including patterns for piping data and managing temporary files for in-place editing (e.g.,dasel -i yaml --root ... < config.yaml > config.yaml.tmp && mv config.yaml.tmp config.yaml). - [PROMPT_INJECTION]: The skill presents a surface for indirect prompt injection as it is designed to ingest and process untrusted structured data from various formats (JSON, YAML, XML, etc.) using a flexible query engine.
- Ingestion points: Data is read from stdin and files via shell redirection in multiple examples throughout
SKILL.mdandreferences/input-output.md. - Boundary markers: No delimiters or explicit instructions are provided to help the agent distinguish between data content and processing instructions.
- Capability inventory: The
daseltool includes functions for runtime file access (readFile()), environment variable interpolation ($VAR), and Base64 decoding (base64d()). - Sanitization: No sanitization or validation of the input data or the resulting query strings is mentioned.
- [DATA_EXFILTRATION]: The documentation in
references/functions.mddescribes thereadFile(path)function, which enables the reading of arbitrary files at runtime. This capability represents a risk of exposing sensitive local files (e.g., configuration secrets or credentials) if an agent is induced to execute a query containing a malicious file path.
Audit Metadata