hermes-ops
Pass
Audited by Gen Agent Trust Hub on Apr 12, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONCREDENTIALS_UNSAFE
Full Analysis
- [COMMAND_EXECUTION]: The skill relies on the
hermesCLI for its core functionality, instructing the agent to execute commands for status checks, service management (e.g.,hermes gateway restart), and diagnostic repairs. - [DATA_EXFILTRATION]: The instructions direct the agent to read and modify sensitive local configuration files, including
.envfiles,config.yaml, and contents within the~/.hermes/directory, which may contain environment-specific secrets or operational data. - [CREDENTIALS_UNSAFE]: The skill includes instructions and commands for managing authentication credentials and providers using
hermes auth list,hermes auth add, andhermes auth reset. - [INDIRECT_PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface as it requires the agent to parse and act upon output from diagnostic tools like
hermes doctororhermes statuswithout using explicit boundary markers or output sanitization. - Ingestion points: Tool outputs from
hermes status,hermes doctor, andhermes gateway statusare ingested into the agent's context. - Boundary markers: Absent; the instructions do not specify delimiters for separating tool output from instructions.
- Capability inventory: The skill allows for shell command execution, service restarts, and file system modifications (config and source code).
- Sanitization: Absent; there is no mention of filtering or validating the output from the Hermes CLI before the agent processes it.
- [DYNAMIC_EXECUTION]: The skill permits the agent to modify local source code and configuration files at runtime to resolve identified bugs or misconfigurations.
Audit Metadata