message-ipc
Pass
Audited by Gen Agent Trust Hub on Mar 12, 2026
Risk Level: SAFEPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION]: The library implements an IPC communication layer that serves as a vulnerability surface for indirect prompt injection through data received from external processes.\n
- Ingestion points: In
src/index.ts, theMessageIpcclass initializes a listener on the IPC channel usingthis.channel.on('message', ...).\n - Boundary markers: The implementation lacks boundary markers or instructions to the model to ignore potential instructions embedded within the IPC data payloads.\n
- Capability inventory: The library facilitates bi-directional data transfer via the
postmethod insrc/index.tsand allows for processing logic in subclass-definedexecmethods.\n - Sanitization: No sanitization or validation logic is applied to message payloads before they are passed to the execution handler.
Audit Metadata