makefile-dogfooder
Warn
Audited by Gen Agent Trust Hub on Feb 27, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill performs active testing of Makefiles by executing targets using
subprocess.run(['make', ...])as described in the Testing Module. While it recommends dry-runs (make -n), the full test mode executes targets directly. - [COMMAND_EXECUTION]: The Generation Module creates and applies new shell-executable targets to the local filesystem. These templates include direct Python execution via
python -cand other shell commands which are then triggered by the agent or user. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection via the processing of untrusted Makefiles.
- Ingestion points: The Discovery and Analysis phases in
SKILL.mdandmodules/analysis.mdread the contents of all files matching Makefile patterns. - Boundary markers: None are defined to isolate data from instructions during parsing.
- Capability inventory: The skill has the ability to write to files (
--applyflag) and execute shell commands through the system'smakeandpythoninterpreters. - Sanitization: The analysis logic uses basic regex and
awkfor parsing, which is insufficient to prevent execution of malicious code embedded in Makefile variables (e.g., using the$(shell ...)construct).
Audit Metadata