hosting-copyparty
Pass
Audited by Gen Agent Trust Hub on Mar 14, 2026
Risk Level: SAFECOMMAND_EXECUTIONCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill documentation provides commands using
sudofor service management (systemctl), container operations (podman), and log retrieval (journalctl). These are standard administrative actions for the skill's stated purpose of server management. - [CREDENTIALS_UNSAFE]: Troubleshooting procedures involve reading plaintext secrets from
/run/agenix/copyparty-passwordand the service's configuration files. This practice exposes sensitive credentials to the agent's context during debugging sessions. - [EXTERNAL_DOWNLOADS]: The system includes a version tracking mechanism that queries the GitHub Releases API (
api.github.com) to check for software updates. This is an expected behavior for maintaining the Copyparty service. - [PROMPT_INJECTION]: The skill maintains an indirect prompt injection surface by processing untrusted data from
podman logsandjournalctl. Ingestion points include container and system logs as described inSKILL.mdandtroubleshooting.md. Boundary markers and explicit sanitization logic for this data are absent. Capability inventory includes high-privilege operations such assystemctl restartandpodman exec, which could be exploited if malicious content in the logs influences the agent.
Audit Metadata