verify-deploy

Pass

Audited by Gen Agent Trust Hub on Mar 5, 2026

Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
  • [PROMPT_INJECTION]: The skill is vulnerable to Indirect Prompt Injection because it ingests untrusted data from external sources and incorporates it into the agent's context.
  • Ingestion points: The skill reads the latest commit information via git log -1 --name-only and fetches application logs using gcloud run services logs read.
  • Boundary markers: The skill does not employ delimiters or specific instructions to help the agent distinguish between its own logic and the data contained within the logs or commit messages.
  • Capability inventory: The skill has the capability to execute system commands (bash), interact with cloud CLI tools (gcloud, vercel), and perform network requests (curl).
  • Sanitization: There is no evidence of sanitization or filtering applied to the retrieved logs or git data before they are processed by the agent.
  • [COMMAND_EXECUTION]: The skill relies on several CLI tools for its core functionality.
  • Executes git commands to inspect local repository state.
  • Executes vercel commands to list and inspect deployments for a specific project ID (prj_00zlLdZVgbP8XjDWIEXSRdFyqDqA).
  • Executes gcloud commands to list builds and describe service states for project bobbys-project-346400.
  • Executes curl to verify health endpoints on specific production URLs.
  • [DATA_EXPOSURE]: The skill contains hardcoded configuration data related to the author's infrastructure.
  • Hardcoded Vercel Project ID: prj_00zlLdZVgbP8XjDWIEXSRdFyqDqA.
  • Hardcoded GCP Project ID: bobbys-project-346400.
  • Hardcoded production and health-check URLs. While these are not sensitive credentials (like API keys), they expose the specific architectural details and naming conventions of the author's deployment pipeline.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 5, 2026, 12:34 PM