verify-deploy
Pass
Audited by Gen Agent Trust Hub on Mar 5, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is vulnerable to Indirect Prompt Injection because it ingests untrusted data from external sources and incorporates it into the agent's context.
- Ingestion points: The skill reads the latest commit information via
git log -1 --name-onlyand fetches application logs usinggcloud run services logs read. - Boundary markers: The skill does not employ delimiters or specific instructions to help the agent distinguish between its own logic and the data contained within the logs or commit messages.
- Capability inventory: The skill has the capability to execute system commands (
bash), interact with cloud CLI tools (gcloud,vercel), and perform network requests (curl). - Sanitization: There is no evidence of sanitization or filtering applied to the retrieved logs or git data before they are processed by the agent.
- [COMMAND_EXECUTION]: The skill relies on several CLI tools for its core functionality.
- Executes
gitcommands to inspect local repository state. - Executes
vercelcommands to list and inspect deployments for a specific project ID (prj_00zlLdZVgbP8XjDWIEXSRdFyqDqA). - Executes
gcloudcommands to list builds and describe service states for projectbobbys-project-346400. - Executes
curlto verify health endpoints on specific production URLs. - [DATA_EXPOSURE]: The skill contains hardcoded configuration data related to the author's infrastructure.
- Hardcoded Vercel Project ID:
prj_00zlLdZVgbP8XjDWIEXSRdFyqDqA. - Hardcoded GCP Project ID:
bobbys-project-346400. - Hardcoded production and health-check URLs. While these are not sensitive credentials (like API keys), they expose the specific architectural details and naming conventions of the author's deployment pipeline.
Audit Metadata