deployment
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (LOW): The skill utilizes the
railwayCLI through a Bash tool to perform legitimate management tasks such as listing deployments, viewing logs, and restarting services. These operations are consistent with the skill's stated purpose. - [PROMPT_INJECTION] (HIGH): The skill is susceptible to Indirect Prompt Injection (Category 8) due to the combination of untrusted data ingestion and high-privilege write capabilities.
- Ingestion points: The skill explicitly instructs the agent to read application and build logs using
railway logs(found inSKILL.md). Logs are external data that can be influenced by an attacker if they can trigger log entries in the managed application. - Boundary markers: Absent. There are no instructions or delimiters provided to ensure the agent ignores instructions potentially embedded within the log output.
- Capability inventory: The skill allows the agent to execute impactful commands including
railway redeploy,railway down, andrailway environment edit(which can modify secrets or delete services viaisDeleted: true). - Sanitization: No sanitization or validation of log content is performed before the agent processes it, allowing malicious instructions in logs to potentially influence the agent's next actions.
Recommendations
- AI detected serious security threats
Audit Metadata