health-check
Pass
Audited by Gen Agent Trust Hub on Apr 13, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Provides templates for Docker healthchecks utilizing
curl,pg_isready, andredis-clito monitor service health. These operations are intended for local service verification within containerized environments. - [PROMPT_INJECTION]: Implements a route discovery and verification mechanism that recursively scans the
app/api/directory and parses file content. This functionality creates an indirect prompt injection surface as it processes untrusted data (local file content) to determine execution paths for network requests. - Ingestion points: Recursive filesystem scanning of the
app/api/directory as described inSKILL.mdfor route discovery. - Boundary markers: Absent; the scanner parses file content for HTTP method exports without explicit delimiters or instructions to ignore embedded content.
- Capability inventory: Filesystem read access and network request capabilities (
fetch) are used to discover and verify routes. - Sanitization: No validation or sanitization is described for the discovered route paths or the content of the
route.tsfiles before they are processed by the health verification logic.
Audit Metadata