debug-with-file

Pass

Audited by Gen Agent Trust Hub on Apr 26, 2026

Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill executes shell commands using bash to determine the project's root directory via git and to create a local workspace for session logs and documents.\n- [COMMAND_EXECUTION]: Implements dynamic code modification by inserting logging instrumentation (Python/JavaScript) into project files to gather runtime data.\n- [PROMPT_INJECTION]: Processes untrusted user input from the $BUG variable across multiple steps. Evidence: (1) Ingestion point: $BUG parameter in SKILL.md; (2) Boundary markers: None; (3) Capabilities: Shell command execution and local file modification; (4) Sanitization: The input is sanitized for use in file slugs, but interpolated directly into documentation templates and search keywords.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 26, 2026, 06:54 PM