app-platform-router
Warn
Audited by Gen Agent Trust Hub on Feb 27, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill depends on multiple resources hosted under the personal GitHub/GHCR account
bikramkgupta, which is not on the trusted vendors list. These include: - Container images for debugging and sandboxing:
ghcr.io/bikramkgupta/debug-python,ghcr.io/bikramkgupta/debug-node,ghcr.io/bikramkgupta/sandbox-python, andghcr.io/bikramkgupta/sandbox-node. - Devcontainer templates and configurations cloned via
git clone https://github.com/bikramkgupta/do-app-devcontainer.git. - The
do-app-sandboxPython package, which is central to the troubleshooting and sandbox workflows. - [COMMAND_EXECUTION]: The skill uses the
do-app-sandboxSDK to provide programmatic shell access to running containers (Sandbox.get_from_id) and to create ephemeral execution environments (Sandbox.create). This capability is used to execute arbitrary shell commands for diagnostics, code interpretation, and infrastructure validation across multiple scripts (e.g.,live-troubleshooting.md,debug-container.md). - [DATA_EXFILTRATION]: The
post-create.shscript andSKILL.mddocumentation fordevcontainersandtroubleshootingreference and modify permissions for sensitive local directories including~/.aws/credentials,~/.ssh,~/.claude, and~/.codex. Accessing these paths creates a potential path for credential exposure if an agent is misdirected. - [PROMPT_INJECTION]: The
migrationskill involves an automated discovery phase where it clones and parses untrusted third-party repositories (e.g.,Procfile,app.json,heroku.yml,render.yaml). - Ingestion points:
detect_platform.pyandanalyze_architecture.pyread and parse configuration files and source code from user-provided repository URLs. - Boundary markers: No explicit instructions to ignore embedded instructions in the processed files were found in the parsing logic.
- Capability inventory: The skill possesses extensive capabilities including file system write access, network operations via
curl/psql/gh, and arbitrary command execution viado-app-sandbox. - Sanitization: While
create_schema_user.pyusespsycopg2.sql.Identifierfor safe SQL composition, the initial architectural analysis depends on interpreting potentially malicious instructions embedded in configuration files.
Audit Metadata