padep-wells
Pass
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: Executes curl and jq to fetch and process structured JSON data from official Pennsylvania government portals including data.pa.gov and gis.dep.pa.gov. These operations are limited to data retrieval from well-known public services.
- [PROMPT_INJECTION]: Identified an indirect prompt injection surface associated with the ingestion of external data.
- Ingestion points: Data is pulled from PA Open Data (nfax-tpjr.json) and PA DEP ArcGIS REST services as described in SKILL.md and api_reference.md.
- Boundary markers: External data is formatted within markdown tables in the final output.
- Capability inventory: Capabilities are restricted to HTTP GET requests and JSON parsing; no persistent storage, administrative privilege escalation, or shell execution capabilities are present.
- Sanitization: The documentation does not specify methods for sanitizing or validating API responses before they are presented to the user.
Audit Metadata