discover-project-logs
Pass
Audited by Gen Agent Trust Hub on Mar 17, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [SAFE]: The skill operates as a read-only tool for identifying log file paths using standard file system and container utilities.
- [COMMAND_EXECUTION]: The skill utilizes standard CLI commands such as
docker logsanddocker compose logsto retrieve information from containerized environments. These are common administrative operations used appropriately for log discovery. - [DATA_EXFILTRATION]: The skill involves reading
.envand framework configuration files (e.g.,logging.php,monolog.yaml). While these files can contain sensitive information, the instructions specifically target log-related configuration keys likeLOG_CHANNELandLOG_PATH. No evidence of data exfiltration or hardcoded credentials was found. - [PROMPT_INJECTION]: An indirect prompt injection surface is present as the skill processes untrusted project files and log content.
- Ingestion points: Project configuration files (e.g.,
composer.json,.env,logging.php,monolog.yaml) and discovered log files. - Boundary markers: No specific boundary markers or delimiters are defined to isolate or sanitize untrusted content during processing.
- Capability inventory: The skill utilizes
Glob,Grep,Read, andBashtools to perform its discovery logic. - Sanitization: The instructions do not specify any validation or sanitization of the ingested file content before it is processed by the agent.
Audit Metadata