deepspace
Pass
Audited by Gen Agent Trust Hub on May 1, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill utilizes the
deepspaceandcreate-deepspacepackages from the author's ecosystem for project scaffolding and management. - [COMMAND_EXECUTION]: Project operations rely on a dedicated CLI for authentication, local development, and deployment (e.g.,
npx deepspace login,npx deepspace deploy). - [DATA_EXFILTRATION]: For identity management and testing, the skill accesses sensitive local file paths:
~/.deepspace/session(auth tokens),~/.deepspace/test-accounts.json(test credentials), and environment variables in.dev.varsor.env(project secrets). - [PROMPT_INJECTION]: A surface for indirect prompt injection exists (Category 8) due to the skill's architectural pattern:
- Ingestion points: Untrusted data is retrieved from external sources like Wikipedia, GitHub, and search engines via proxied integration endpoints.
- Boundary markers: The instructions do not define mandatory delimiters or isolation protocols for external data when it is interpolated into AI prompts.
- Capability inventory: Privileged operations such as server actions and database mutations are available to scripts that may process this external data.
- Sanitization: Guidelines for filtering or escaping external content before processing are absent in the provided documentation.
Audit Metadata