moai-domain-cli-tool
Pass
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The Go example for a Docker Image Builder uses os/exec.Command to execute the docker CLI based on user-provided arguments. This behavior is consistent with the example's stated purpose of managing container images.
- [COMMAND_EXECUTION]: The Rust plugin architecture snippet demonstrates a discovery mechanism for shared object files (.so) in a local directory for dynamic loading, which is a standard pattern for modular CLI applications.
- [PROMPT_INJECTION]: The skill provides templates that ingest untrusted data, creating a potential surface for indirect prompt injection.
- Ingestion points: CLI arguments and user-provided configuration files in examples.md.
- Boundary markers: Absent. The templates focus on parsing logic rather than input delimiters.
- Capability inventory: Subprocess execution (Go), network operations (Node.js), and file system writes (Rust).
- Sanitization: Absent. The provided examples demonstrate core framework usage without defensive input validation for adversarial payloads.
Audit Metadata