awiki-debug

Pass

Audited by Gen Agent Trust Hub on Apr 12, 2026

Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill utilizes the Bash tool to execute specific subcommands of awiki-cli. This is restricted to the vendor's own CLI tool, providing a controlled environment for system debugging.
  • [PROMPT_INJECTION]: The skill possesses an indirect prompt injection surface as it retrieves data from external sources like local databases and migration files.
  • Ingestion points: Database query results from awiki-cli debug db query and file content from awiki-cli debug db import-v1.
  • Boundary markers: Absent; the skill relies on natural language instructions to guide agent behavior when handling this data.
  • Capability inventory: Bash tool access restricted to the awiki-cli binary.
  • Sanitization: No explicit sanitization or validation of the ingested data is described.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 12, 2026, 12:49 PM