microcks-import-artifacts
Pass
Audited by Gen Agent Trust Hub on Mar 19, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: Fetches the official
microcks-clibinary from the Microcks GitHub repository. - [REMOTE_CODE_EXECUTION]: Downloads a binary from a remote URL and subsequently executes it to perform the import tasks.
- [COMMAND_EXECUTION]: Executes shell scripts that orchestrate the interaction between the filesystem, Docker, and the local Microcks API.
- [COMMAND_EXECUTION]: Uses
docker runto execute themikefarah/yqtool for YAML transformation. - [PROMPT_INJECTION]: Interprets data from untrusted OpenAPI specifications which serves as an indirect prompt injection surface.
- Ingestion points: The
SPEC_FILEpath provided as an argument to the import script. - Boundary markers: No specific delimiters are used for the content extracted from the specification.
- Capability inventory: Includes network API calls, Docker container execution, and running the
microcks-clibinary. - Sanitization: Employs
jqandsedto process and encode data before passing it to the Microcks API.
Audit Metadata