developer-toolbox
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- COMMAND_EXECUTION (HIGH): Multiple agents are equipped with the 'Bash' tool and provide instructions or examples for executing powerful shell commands.
- Evidence:
agents/build-verifier.mdcontainsrm -rf dist && npm run build. - Evidence:
agents/debugger.mdsuggests usingtcpdumpfor network analysis andcurlfor API debugging. - Evidence:
agents/test-runner.mdprovides examples for runningnpm testand other test suites. - Note: The severity is downgraded to MEDIUM as these actions are central to the skill's primary purpose as a developer toolbox.
- PROMPT_INJECTION (LOW): The skill exhibits a significant surface for Indirect Prompt Injection (Category 8) due to its core function of processing untrusted data.
- Ingestion points:
agents/code-reviewer.md(source code),agents/debugger.md(stack traces/logs),agents/test-runner.md(source code). - Boundary markers: Absent; there are no specific delimiters or instructions to ignore embedded commands within the processed data.
- Capability inventory: Most agents have
Bashtool access; several haveWriteandEditcapabilities for the filesystem. - Sanitization: No sanitization, escaping, or validation of external content is defined in the instructions.
- PRIVILEGE_ESCALATION (MEDIUM): The
debuggeragent suggests tools that often require elevated permissions. - Evidence:
agents/debugger.mdreferencestcpdump, which typically requires root or sudo privileges to capture network traffic.
Audit Metadata