tutorial-updates
Warn
Audited by Gen Agent Trust Hub on Apr 13, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill extracts shell commands from
.tapefiles and tutorial manifests and executes them via the shell. Evidence: Step 1.5.4 inSKILL.mdusesbash -cto run commands extracted fromTypedirectives in tape files. Evidence:modules/manifest-parsing.mddescribes arequiresfield in Playwright components that executes background commands. - [COMMAND_EXECUTION]: The skill performs binary rebuilds using system build tools. Evidence: Phase 1.6.3 in
SKILL.mdexecutescargo install --path .ormake builddepending on the detected build system. - [EXTERNAL_DOWNLOADS]: The skill documentation suggests installing external dependencies from well-known sources. Evidence:
SKILL.mderror handling section suggestsgo install github.com/charmbracelet/vhs@latestandnpm install -D @playwright/test. - [COMMAND_EXECUTION]: The validation logic (Phase 1.5.2) executes base commands with the
--helpflag to verify parameters. Evidence:modules/tape-validation.mdPhase 3 extracts commands and runs$base_cmd --helpto discover valid flags. - [COMMAND_EXECUTION]: The skill is susceptible to indirect prompt injection via malicious command strings in tutorial assets.
- Ingestion points:
.tapefiles and.manifest.yamlfiles. - Boundary markers: Absent; commands are extracted and executed directly without delimiters or safety instructions.
- Capability inventory:
Bashtool,timeout 5s bash -c,cargo install,make build. - Sanitization: Absent; the skill relies on
sedandgrepfor extraction without verifying command safety.
Audit Metadata