gradle-troubleshooting
Pass
Audited by Gen Agent Trust Hub on Feb 24, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes shell commands to manage the Gradle environment and processes. Commands include
./gradlew,pkill -f \"gradle.*daemon\",docker ps,rm -rf, andchmod +x. These are standard diagnostic and remediation tools for the stated purpose of the skill.\n- [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface due to its analysis of build logs and configuration files. \n - Ingestion points: Build logs,
build.gradle.kts, andgradle.propertiesare processed by the agent (SKILL.md, references/*.md).\n - Boundary markers: Absent; the skill does not define specific delimiters to isolate external data or warn the agent to ignore instructions within that data.\n
- Capability inventory: Shell execution is enabled via commands like
./gradlew,pkill,docker,rm,chmod, andechoacross the skill body and reference files.\n - Sanitization: No explicit sanitization or validation of the analyzed build data is implemented.
Audit Metadata