os-integrations
Pass
Audited by Gen Agent Trust Hub on Feb 24, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill fetches task graph data and worker pool configurations from Mozilla's official Taskcluster instance and GitHub repositories (mozilla-releng/fxci-config).
- [COMMAND_EXECUTION]: The script
run_try.pyexecutesgitcommands to manage temporary branches and./machcommands within the user's~/firefoxdirectory to trigger test runs. - [REMOTE_CODE_EXECUTION]: Uses the
uvxutility to dynamically download and execute thelumberjackthtool for monitoring test progress after a push. - [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface by processing data from external APIs to construct shell commands.
- Ingestion points: Fetches JSON task graphs from
firefox-ci-tc.services.mozilla.comand job status fromlando.services.mozilla.com. - Boundary markers: No explicit delimiters or instructions are used to separate untrusted remote data from local command templates.
- Capability inventory: The skill can execute local binary files (
mach,git), network operations viahttpx/requests, and runtime tool execution viauvx. - Sanitization: Implements validation for preset names and uses subprocess argument lists to mitigate direct shell injection, though it lacks deep validation of remote task labels used in queries.
Audit Metadata