deploy
Fail
Audited by Gen Agent Trust Hub on Apr 10, 2026
Risk Level: HIGHDATA_EXFILTRATIONCOMMAND_EXECUTION
Full Analysis
- [DATA_EXFILTRATION]: The
select_mode.pyscript, utilizing functionality from shared helpers, automatically probes the current working directory for sensitive files including.env,docker-compose.yml, and GitHub Action workflows. It reads and parses these files to provide a 'legacy transition' error message. Accessing sensitive files like.envis classified as a high-severity finding due to the risk of exposing credentials or configuration metadata. - [COMMAND_EXECUTION]: The skill uses a pattern where the agent is instructed to
evalthe output of a Python script to set environment variables. This represents dynamic code execution at runtime. While the script employsshlex.quotefor sanitization, this mechanism allows configuration data from the filesystem to directly execute as shell exports within the agent's session. - [COMMAND_EXECUTION]: The skill facilitates production-level operations including SSH access, Docker container restarts, and database migrations. These commands rely on variables (such as
MODE_DROPLET_SSHandMODE_DEPLOY_ROOT) resolved from external YAML configuration files, creating a significant capability surface that could be abused if configuration files are compromised.
Recommendations
- AI detected serious security threats
Audit Metadata