ralph-loop
Pass
Audited by Gen Agent Trust Hub on Apr 20, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The orchestrator script
scripts/ralph_loop.pyautomates repository management by executinggitcommands such asstatus,add, andcommitusing thesubprocessmodule. These calls use the secure list-based argument format which avoids shell interpolation, but they constitute automated command execution within the user's workspace.\n- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it ingests and parsesTASK-*.mdfiles from the local environment. Metadata like task titles and descriptions are extracted and incorporated into the agent's logic and output without sanitization.\n - Ingestion points:
scripts/ralph_loop.pyparses files in thetasks/directory using theparse_task_filefunction.\n - Boundary markers: Absent. The skill does not use delimiters or instructions to prevent the agent from following commands embedded in task metadata.\n
- Capability inventory: The skill utilizes
Bash,Write, andEdittools and can execute Git commands via its Python script.\n - Sanitization: None. Extracted strings from YAML frontmatter are used directly in logic and console output.
Audit Metadata