cnc-execution-engine
Pass
Audited by Gen Agent Trust Hub on Feb 27, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill facilitates running the
cncCLI binary for API interactions. Evidence: Instructions include multiple shell examples such ascnc context create,cnc auth set-token, andcnc execute. - [DATA_EXFILTRATION]: The skill manages API tokens and transmits data to external GraphQL endpoints. Evidence: The
cnc authandcnc executecommands handle sensitive credentials and network requests. The skill identifies~/.cnc/config/credentials.jsonas the storage location, noting a secure 0o600 permission set. - [PROMPT_INJECTION]: The skill presents an attack surface for indirect prompt injection via command-line arguments. Ingestion points: Data entering through the
--query,--variables, and--fileflags in the SKILL.md file. Boundary markers: None identified in the provided documentation. Capability inventory: Ability to execute shell commands (cnc CLI) and read local files via the--fileflag. Sanitization: The documentation does not specify any input validation or escaping for the GraphQL payloads.
Audit Metadata