systematic-debugging
Pass
Audited by Gen Agent Trust Hub on Apr 10, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill requires the agent to execute various development tools including
cargo(Rust build tool),git(version control), andgh(GitHub CLI). These commands are used to reproduce bugs, analyze history, and manage issues within the Freenet project environment. This is standard for a development-oriented skill.\n- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it processes potentially untrusted data from GitHub issue descriptions and log files.\n - Ingestion points: Data enters the context via
gh issue viewcommands and by reading log files produced during test execution (e.g.,RUST_LOGoutput).\n - Boundary markers: There are no explicit instructions to use delimiters or boundary markers when processing these external data sources to prevent the agent from following instructions embedded within the data.\n
- Capability inventory: The skill can execute shell commands, modify GitHub issues, and spawn subagents for codebase analysis, which could be misused if a malicious instruction is followed.\n
- Sanitization: No sanitization or validation of the ingested data is performed before it is processed by the agent.
Audit Metadata