engflow-artifacts
Pass
Audited by Gen Agent Trust Hub on Mar 4, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The Python script
engflow_artifacts.pyexecutes system commands includingcurl,unzip, and theengflow_authCLI viasubprocess.run. These executions use argument lists rather than shell strings, which effectively prevents shell injection vulnerabilities. - [EXTERNAL_DOWNLOADS]: The skill fetches build metadata, test logs, and binary blobs from
mesolite.cluster.engflow.com. These network operations are necessary for the skill's core functionality and target the vendor's own build infrastructure. - [PROMPT_INJECTION]: The skill exposes an indirect prompt injection surface because it ingests and processes data from external test logs and XML files. 1. Ingestion points: The agent reads
test.logandtest.xmlfiles downloaded by the script. 2. Boundary markers: No explicit delimiters or instructions to ignore embedded commands are present in the script. 3. Capability inventory: The skill can execute subprocesses for network and file manipulation. 4. Sanitization: There is no sanitization or filtering of the log content before it is presented to the agent.
Audit Metadata