moai-baas-vercel-ext
Pass
Audited by Gen Agent Trust Hub on Mar 2, 2026
Risk Level: SAFECREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The skill documentation includes example environment variables with hardcoded connection strings. Evidence:
DATABASE_URL=postgresql://user:pass@host:5432/dbandREDIS_URL=redis://user:pass@host:6379in the.env.localand.env.productionsnippets withinSKILL.md. - [EXTERNAL_DOWNLOADS]: The CI/CD workflow uses a non-official, third-party GitHub Action for deployment tasks. Evidence: Use of
amondnet/vercel-action@v20in the.github/workflows/vercel-deploy.ymlconfiguration. - [COMMAND_EXECUTION]: The skill provides instructions for executing shell commands to manage dependencies and deploy the application. Evidence: Bash commands such as
npm install,npm run build, andvercel --prodare detailed in the documentation. - [PROMPT_INJECTION]: The skill's architecture is susceptible to indirect prompt injection via the handling of untrusted web request data. Ingestion points: Edge functions and A/B testing logic in
SKILL.mdextract data fromreq.url,req.headers, and request parameters. Boundary markers: No boundary markers or instructions to disregard embedded commands are present in the processing logic. Capability inventory: The skill utilizesBash,Write, andWebFetchtools. Sanitization: There is no evidence of input validation or sanitization for the request data before it is processed by the logic or potentially passed to other tools.
Audit Metadata