tmux-status-debug
Pass
Audited by Gen Agent Trust Hub on Feb 20, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [DATA_EXPOSURE] (LOW): The use of
tmux capture-paneallows the agent to read contents from active terminal panes. This poses a risk of exposing sensitive data such as API keys, secrets, or private environment variables if they are currently visible in those terminal sessions. - [INDIRECT_PROMPT_INJECTION] (LOW): The skill ingests untrusted text from tmux panes, which could contain malicious instructions designed to manipulate the agent's behavior.
- Ingestion points: Terminal output read via
tmux capture-paneinSKILL.md. - Boundary markers: No delimiters or specific instructions are provided to distinguish captured content from the agent's system instructions.
- Capability inventory: Execution of
tmuxcommands and execution of local Python scripts. - Sanitization: The skill mentions a function
strip_ansi_and_controlto remove terminal formatting, but it does not perform semantic sanitization of the content itself. - [COMMAND_EXECUTION] (SAFE): The skill utilizes standard system utilities including
tmux,grep, andnixfor its intended debugging functionality.
Audit Metadata