atmos-yaml-functions

Warn

Audited by Gen Agent Trust Hub on Mar 4, 2026

Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSCREDENTIALS_UNSAFE
Full Analysis
  • [COMMAND_EXECUTION]: The !exec function enables the execution of arbitrary shell scripts and system commands (e.g., !exec date +%s, !exec get-config.sh). This capability can be exploited to run malicious code if the command string is influenced by untrusted data.\n- [EXTERNAL_DOWNLOADS]: The !include function supports fetching content from various remote protocols including HTTPS, GitHub, S3, GCS, and OCI registries. This allows for the ingestion of external and potentially untrustworthy data into the local execution environment.\n- [CREDENTIALS_UNSAFE]: Multiple functions are designed to retrieve sensitive information, such as !env for environment variables, !store for secret management systems (SSM, Redis, Azure Key Vault), and !terraform.state for infrastructure outputs, which may contain sensitive credentials.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 4, 2026, 06:40 PM