pulumi-neo
Pass
Audited by Gen Agent Trust Hub on Feb 26, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill executes the local
pulumiCLI commandpulumi org get-defaultwithin thescripts/neo_task.pyscript to identify the active organization for API requests. This is a standard operation for Pulumi integration. - [EXTERNAL_DOWNLOADS]: The skill performs network operations to
api.pulumi.comto create and manage Neo tasks. As Pulumi is a well-known infrastructure-as-code service, these communications are considered safe and necessary for the skill's primary function. - [PROMPT_INJECTION]: The skill acts as a bridge between the user and another AI agent (Pulumi Neo). It ingests responses from the Pulumi API and displays them to the user or the calling agent. While this creates a surface for indirect prompt injection if the remote service were to return malicious instructions, it is a standard characteristic of AI-to-AI interaction tools. The script neutrally formats and displays these responses without executing their content as code.
- Ingestion points: Task events are fetched from
https://api.pulumi.com/api/preview/agents/{org}/tasks/{task_id}/eventsvia theget_eventsfunction inscripts/neo_task.py. - Boundary markers: The script uses simple markers like
[Neo]and[You]to separate conversation participants in the console output. - Capability inventory: The skill can execute the
pulumiCLI viasubprocessand perform network requests to the Pulumi API using therequestslibrary. - Sanitization: No explicit sanitization of the remote AI's text content is performed before displaying it, which is typical for chat-based wrappers.
Audit Metadata