systematic-debugging
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCREDENTIALS_UNSAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE] (MEDIUM): The 'Phase 1' diagnostic examples include 'env | grep IDENTITY'. This command prints the full value of any environment variable containing the string 'IDENTITY'. If used on systems where secrets or tokens are stored in the environment, this could lead to accidental credential exposure in logs.
- [COMMAND_EXECUTION] (LOW): The skill directs the agent to run various system commands like 'security find-identity' and 'codesign'. While appropriate for debugging signing issues, users should be aware that the agent will be performing active system investigation.
- [PROMPT_INJECTION] (LOW): The skill is susceptible to Indirect Prompt Injection (Category 8). 1. Ingestion points: Error messages, stack traces, and build logs (Phase 1). 2. Boundary markers: No explicit delimiters or instructions to ignore embedded commands are provided. 3. Capability inventory: Ability to execute shell commands, check git diffs, and create/run test scripts. 4. Sanitization: No sanitization of external log input is performed before the agent analyzes it.
Audit Metadata