wsl-embedded-debugging
Warn
Audited by Gen Agent Trust Hub on Mar 17, 2026
Risk Level: MEDIUMPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: Instructions in
SKILL.mdandreferences/wsl-windows-embedded-troubleshooting.mdadvise the agent to bypass security restrictions, such as switching to a 'less restricted mode' or using 'full-access sandboxing' if execution is blocked by policy.\n- [COMMAND_EXECUTION]: The scriptscripts/run_windows_embedded.shis an execution wrapper that runs arbitrary commands passed as arguments.\n- [PROMPT_INJECTION]: The skill captures untrusted firmware logs, which constitutes an indirect prompt injection surface. Ingestion points:scripts/run_windows_embedded.shredirects output to log files. Boundary markers: None. Capability inventory: Subprocess execution of Windows host binaries. Sanitization: None.
Audit Metadata