dojo-deploy
Pass
Audited by Gen Agent Trust Hub on Mar 5, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: The
deploy_local.shscript contains an indirect prompt injection surface because it reads values from amanifest_<profile>.jsonfile and interpolates them directly into shell commands without sanitization. - Ingestion points: The
manifest_${PROFILE}.jsonfile is parsed usingjqin theextract_addressesandstart_toriifunctions. - Boundary markers: None; extracted values like
WORLD_ADDRESSare used directly as arguments in shell commands. - Capability inventory: Subprocess execution of
toriiandkatanavia bash. - Sanitization: There is no validation or escaping of the values extracted from the manifest before they are passed to the shell.
- [COMMAND_EXECUTION]: The skill uses standard Dojo toolchain commands including
sozo,katana, andtoriito manage deployments and local development environments. The provided bash script automates these processes, including background service management and cleanup. - [EXTERNAL_DOWNLOADS]: The skill makes network requests to well-known and trusted infrastructure such as Cartridge RPC endpoints (
api.cartridge.gg) and official Starknet faucets. It also utilizescurlfor local service health checks.
Audit Metadata