hosting-copyparty

Pass

Audited by Gen Agent Trust Hub on Mar 14, 2026

Risk Level: SAFECOMMAND_EXECUTIONCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill documentation provides commands using sudo for service management (systemctl), container operations (podman), and log retrieval (journalctl). These are standard administrative actions for the skill's stated purpose of server management.
  • [CREDENTIALS_UNSAFE]: Troubleshooting procedures involve reading plaintext secrets from /run/agenix/copyparty-password and the service's configuration files. This practice exposes sensitive credentials to the agent's context during debugging sessions.
  • [EXTERNAL_DOWNLOADS]: The system includes a version tracking mechanism that queries the GitHub Releases API (api.github.com) to check for software updates. This is an expected behavior for maintaining the Copyparty service.
  • [PROMPT_INJECTION]: The skill maintains an indirect prompt injection surface by processing untrusted data from podman logs and journalctl. Ingestion points include container and system logs as described in SKILL.md and troubleshooting.md. Boundary markers and explicit sanitization logic for this data are absent. Capability inventory includes high-privilege operations such as systemctl restart and podman exec, which could be exploited if malicious content in the logs influences the agent.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 14, 2026, 06:19 PM