huly-assist
Pass
Audited by Gen Agent Trust Hub on Mar 25, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [SAFE]: No malicious patterns, obfuscation, or unauthorized exfiltration of sensitive data were identified during the analysis.
- [COMMAND_EXECUTION]: The skill defines various shell commands using the
hulybinary (ornode dist/index.js) to interact with the Huly API. This is the primary mechanism for its functionality. - [EXTERNAL_DOWNLOADS]: The skill lists
@hcengineering/api-clientas a required package, which is retrieved from the GitHub Packages registry. - [PROMPT_INJECTION]: The skill has an indirect prompt injection surface because it retrieves and displays content (task titles, descriptions, and document bodies) that could contain malicious instructions from the Huly workspace.
- Ingestion points:
huly tasks,huly task, andhuly docs read(SKILL.md). - Boundary markers: None defined to isolate external data from the agent's instruction stream.
- Capability inventory: Shell command execution via the
hulyCLI for workspace management; file system read access for uploading task descriptions or document content. - Sanitization: The skill documentation does not specify any sanitization or validation of data fetched from Huly.
Audit Metadata