credentials
Warn
Audited by Gen Agent Trust Hub on Feb 20, 2026
Risk Level: MEDIUMPROMPT_INJECTION
Full Analysis
- Dynamic Execution (MEDIUM): The file
index.tsuses dynamicimport()with runtime-computed paths (../../../credentials/indexand../../../db/index). This dynamic loading from paths outside the skill's own directory is a medium-risk pattern that complicates security auditing and could be exploited if the file structure is compromised.\n- Indirect Prompt Injection (LOW): The skill handles untrusted user input via the/creds setcommand without sanitization, creating a vulnerability surface where malicious instructions could be stored and later executed by the agent.\n - Ingestion points:
index.ts(thepartsarray derived from user arguments in theexecutefunction).\n - Boundary markers: None present; the skill documentation and code do not use delimiters or include instructions for the agent to ignore embedded commands in stored data.\n
- Capability inventory: Access to sensitive environment variables (API keys), database write operations, and dynamic code execution (via imports).\n
- Sanitization: None observed; the
setcommand stores the raw string values provided by the user directly into the credential manager.
Audit Metadata