control-metalayer-loop
Pass
Audited by Gen Agent Trust Hub on Mar 17, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The template scripts (e.g., smoke.sh, check.sh, test.sh) utilize the
evalcommand to execute arbitrary instructions provided via environment variables such asCONTROL_CHECK_CMD, which allows for dynamic command overrides. - [COMMAND_EXECUTION]: The skill automates the configuration of git hooks by setting
core.hooksPathto a local.githooksdirectory, enabling the execution of scripts during git operations like commits and pushes. - [COMMAND_EXECUTION]: The bootstrap process dynamically modifies the repository's
Makefileto includeMakefile.control, which establishes an integrated execution surface for the agent's control targets. - [PROMPT_INJECTION]: The skill implements a surface for indirect prompt injection by processing instructions from
.control/commands.yaml. Ingestion points:.control/commands.yaml. Boundary markers: None identified. Capability inventory:evalin shell templates andsubprocess.runincontrol_wizard.py. Sanitization: No sanitization or validation logic for command interpolation was found.
Audit Metadata