OpenCode SDK Development
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- COMMAND_EXECUTION (LOW): The skill provides examples such as
searchFilesandgitStatusthat utilizebun's shell ($) to execute system commands likefindandgit. While Bun provides automatic escaping for variables, shell execution is a high-privilege capability. This is considered LOW severity as it is the primary purpose of an SDK development skill. - EXTERNAL_DOWNLOADS (LOW): The
fetchUrltool example demonstrates the use of thefetchAPI to make network requests to arbitrary URLs. This can be used to download external content into the agent's context. - DATA_EXFILTRATION (LOW): Examples like
contextInfoandprojectInfoprovide access to session metadata and local project structures. If combined with the network capabilities offetchUrl, this could potentially be used for data exfiltration. - PROMPT_INJECTION (LOW): The skill is vulnerable to Indirect Prompt Injection (Category 8c) through the
fetchUrltool. - Ingestion points: External data is ingested via the
fetchcall inexamples/basic-tool.ts. - Boundary markers: The example lacks explicit boundary markers or instructions to ignore embedded prompts in the fetched content.
- Capability inventory: The skill has access to shell execution (
bunshell) and file system listing. - Sanitization: No sanitization of the fetched URL body is performed before returning it to the agent.
Audit Metadata