posthog-debug-bundle
Pass
Audited by Gen Agent Trust Hub on Mar 12, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes Bash scripts to aggregate system information, configuration, and logs into a diagnostic bundle. It accesses the .env file, which is a sensitive operation; however, it attempts to mitigate risk by using sed to redact variable values before including them in the bundle.
- [EXTERNAL_DOWNLOADS]: Executes a curl command to https://api.posthog.com/health to verify API connectivity. PostHog is a well-known service, and this request is documented as part of the skill's primary diagnostic purpose.
- [PROMPT_INJECTION]: The skill ingests untrusted data from application logs (~/.npm/_logs/*.log) and configuration files, creating a potential surface for indirect prompt injection. Ingestion points: .env and npm log files; Boundary markers: None present; Capability inventory: Bash (curl, grep, tar) and Grep; Sanitization: sed is used for redacting .env values, but no sanitization is applied to log content.
Audit Metadata