hackathon-cli
Pass
Audited by Gen Agent Trust Hub on Mar 11, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill is designed to execute the
oatmealCLI tool andbuncommands via subprocesses to perform management tasks. Evidence found inSKILL.mdandreferences/workflow-examples.mdshows usage ofoatmeal hackathons,oatmeal judging, andbun cli. - [EXTERNAL_DOWNLOADS]: The skill instructs the user to install the
@oatmeal/clipackage from the NPM registry usingnpm install -g @oatmeal/cliornpx @oatmeal/cli. This is a standard installation procedure for the platform's official tool. - [CREDENTIALS_UNSAFE]: The skill manages authentication using API keys. It handles the
OATMEAL_API_KEYenvironment variable and saves configuration, including credentials, to the local file~/.oatmeal/config.json. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection (Category 8) because it parses output from the
oatmealCLI (using the--jsonflag) and uses that data to construct subsequent commands. - Ingestion points: CLI output from commands like
oatmeal hackathons listandoatmeal hackathons getparsed inSKILL.md. - Boundary markers: None identified in the provided instructions or examples.
- Capability inventory: Subprocess execution of
oatmealandbuncommands. - Sanitization: No explicit sanitization or validation of the CLI output is described before it is used in subsequent operations.
Audit Metadata