blucli
Warn
Audited by Gen Agent Trust Hub on Mar 12, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill configuration specifies an installation step that fetches a Go module from 'github.com/steipete/blucli/cmd/blu@latest'. This repository belongs to an individual developer and is not associated with a verified or trusted organization.
- [COMMAND_EXECUTION]: The skill's primary functionality is built around executing the 'blu' binary to interact with local network hardware for discovery, volume control, and playback management.
- [PROMPT_INJECTION]: The skill exhibits an attack surface for indirect prompt injection:
- Ingestion points: Processes potentially untrusted data from local network devices ('blu devices') and external search results ('blu tunein search').
- Boundary markers: No explicit delimiters or instructions to ignore embedded commands are present in the command templates.
- Capability inventory: Includes the ability to change device states, grouping, and volume settings.
- Sanitization: No evidence of input validation or escaping for the data retrieved from external sources before it is processed by the agent.
Audit Metadata