moai-domain-cli-tool

Pass

Audited by Gen Agent Trust Hub on Mar 1, 2026

Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The Go example for a Docker Image Builder uses os/exec.Command to execute the docker CLI based on user-provided arguments. This behavior is consistent with the example's stated purpose of managing container images.
  • [COMMAND_EXECUTION]: The Rust plugin architecture snippet demonstrates a discovery mechanism for shared object files (.so) in a local directory for dynamic loading, which is a standard pattern for modular CLI applications.
  • [PROMPT_INJECTION]: The skill provides templates that ingest untrusted data, creating a potential surface for indirect prompt injection.
  • Ingestion points: CLI arguments and user-provided configuration files in examples.md.
  • Boundary markers: Absent. The templates focus on parsing logic rather than input delimiters.
  • Capability inventory: Subprocess execution (Go), network operations (Node.js), and file system writes (Rust).
  • Sanitization: Absent. The provided examples demonstrate core framework usage without defensive input validation for adversarial payloads.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 1, 2026, 01:06 AM