awiki-debug
Pass
Audited by Gen Agent Trust Hub on Apr 12, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes the Bash tool to execute specific subcommands of awiki-cli. This is restricted to the vendor's own CLI tool, providing a controlled environment for system debugging.
- [PROMPT_INJECTION]: The skill possesses an indirect prompt injection surface as it retrieves data from external sources like local databases and migration files.
- Ingestion points: Database query results from awiki-cli debug db query and file content from awiki-cli debug db import-v1.
- Boundary markers: Absent; the skill relies on natural language instructions to guide agent behavior when handling this data.
- Capability inventory: Bash tool access restricted to the awiki-cli binary.
- Sanitization: No explicit sanitization or validation of the ingested data is described.
Audit Metadata