debug-with-file
Pass
Audited by Gen Agent Trust Hub on Apr 26, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes shell commands using
bashto determine the project's root directory viagitand to create a local workspace for session logs and documents.\n- [COMMAND_EXECUTION]: Implements dynamic code modification by inserting logging instrumentation (Python/JavaScript) into project files to gather runtime data.\n- [PROMPT_INJECTION]: Processes untrusted user input from the$BUGvariable across multiple steps. Evidence: (1) Ingestion point:$BUGparameter inSKILL.md; (2) Boundary markers: None; (3) Capabilities: Shell command execution and local file modification; (4) Sanitization: The input is sanitized for use in file slugs, but interpolated directly into documentation templates and search keywords.
Audit Metadata