dag-operations
Pass
Audited by Gen Agent Trust Hub on Feb 25, 2026
Risk Level: SAFE
Full Analysis
- [COMMAND_EXECUTION]: The skill uses shell scripts to execute the
hil-dagCLI utility for graph management operations. User-supplied arguments are safely handled via bash arrays to prevent shell injection.\n- [PROMPT_INJECTION]: The skill processes external configuration files (DAG and catalog JSONs) and descriptive metadata fields, creating an indirect prompt injection surface. This is a functional requirement for its workflow management role.\n - Ingestion points:
DAG_PATHandCATALOG_PATHfile inputs, and the--intentparameter indag-assemble.sh.\n - Boundary markers: None present in the shell script wrappers.\n
- Capability inventory: Limited to structural DAG operations via the
hil-dagtool.\n - Sanitization: Employs standard bash array execution (
\"${CMD[@]}\") to maintain command integrity.
Audit Metadata