microcks-import-artifacts

Pass

Audited by Gen Agent Trust Hub on Mar 19, 2026

Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [EXTERNAL_DOWNLOADS]: Fetches the official microcks-cli binary from the Microcks GitHub repository.
  • [REMOTE_CODE_EXECUTION]: Downloads a binary from a remote URL and subsequently executes it to perform the import tasks.
  • [COMMAND_EXECUTION]: Executes shell scripts that orchestrate the interaction between the filesystem, Docker, and the local Microcks API.
  • [COMMAND_EXECUTION]: Uses docker run to execute the mikefarah/yq tool for YAML transformation.
  • [PROMPT_INJECTION]: Interprets data from untrusted OpenAPI specifications which serves as an indirect prompt injection surface.
  • Ingestion points: The SPEC_FILE path provided as an argument to the import script.
  • Boundary markers: No specific delimiters are used for the content extracted from the specification.
  • Capability inventory: Includes network API calls, Docker container execution, and running the microcks-cli binary.
  • Sanitization: Employs jq and sed to process and encode data before passing it to the Microcks API.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 19, 2026, 08:02 AM