secrets-management
Pass
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: SAFECREDENTIALS_UNSAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The skill provides an implementation for an
exportSecretsToEnvfunction that retrieves encrypted credentials from the VS Code SecretStorage and writes them as plaintext key-value pairs into a.envfile in the workspace. This practice creates a significant risk of accidental credential exposure if the plaintext file is inadvertently committed to a code repository. - [COMMAND_EXECUTION]: The skill uses the Node.js
fsmodule to programmatically read and write to the local file system. Specifically, it executesfs.writeFileSyncto create or modify.envfiles based on the internal state of the secrets cache. - [PROMPT_INJECTION]: The skill defines a workflow for scanning and parsing untrusted
.envfiles within the user's workspace, creating a surface for indirect prompt injection. - Ingestion points: Workspace-wide scanning for environment files using
vscode.workspace.findFilesas described inSKILL.md. - Boundary markers: Absent; the parsing logic does not appear to use delimiters to isolate untrusted values from the agent's operational context.
- Capability inventory: The skill possesses file-write capabilities (
fs.writeFileSync) and the ability to update the persistent SecretStorage based on external file content. - Sanitization: No evidence of input validation or sanitization is provided for the secret names or values extracted from discovered environment files.
Audit Metadata