gradle-troubleshooting

Pass

Audited by Gen Agent Trust Hub on Feb 24, 2026

Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill utilizes shell commands to manage the Gradle environment and processes. Commands include ./gradlew, pkill -f \"gradle.*daemon\", docker ps, rm -rf, and chmod +x. These are standard diagnostic and remediation tools for the stated purpose of the skill.\n- [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface due to its analysis of build logs and configuration files. \n
  • Ingestion points: Build logs, build.gradle.kts, and gradle.properties are processed by the agent (SKILL.md, references/*.md).\n
  • Boundary markers: Absent; the skill does not define specific delimiters to isolate external data or warn the agent to ignore instructions within that data.\n
  • Capability inventory: Shell execution is enabled via commands like ./gradlew, pkill, docker, rm, chmod, and echo across the skill body and reference files.\n
  • Sanitization: No explicit sanitization or validation of the analyzed build data is implemented.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 24, 2026, 05:23 PM