atmos-yaml-functions
Warn
Audited by Gen Agent Trust Hub on Mar 4, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSCREDENTIALS_UNSAFE
Full Analysis
- [COMMAND_EXECUTION]: The
!execfunction enables the execution of arbitrary shell scripts and system commands (e.g.,!exec date +%s,!exec get-config.sh). This capability can be exploited to run malicious code if the command string is influenced by untrusted data.\n- [EXTERNAL_DOWNLOADS]: The!includefunction supports fetching content from various remote protocols including HTTPS, GitHub, S3, GCS, and OCI registries. This allows for the ingestion of external and potentially untrustworthy data into the local execution environment.\n- [CREDENTIALS_UNSAFE]: Multiple functions are designed to retrieve sensitive information, such as!envfor environment variables,!storefor secret management systems (SSM, Redis, Azure Key Vault), and!terraform.statefor infrastructure outputs, which may contain sensitive credentials.
Audit Metadata