drupal-contribute
Pass
Audited by Gen Agent Trust Hub on Apr 27, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes Git commands such as
clone,remote add,fetch,checkout, andpushto manage code within a local cache directory (~/.cache/drupal-contrib/). These operations are necessary for the stated purpose of code contribution. - [EXTERNAL_DOWNLOADS]: The skill clones repository data from
git.drupal.org, which is the official and well-known hosting service for the Drupal project. These downloads are performed to establish a local development environment for the user. - [PROMPT_INJECTION]: The skill exhibits surface area for indirect prompt injection. * Ingestion points: Project names and issue descriptions are ingested from user input, and external code is ingested via
git clonefromgit.drupal.org(SKILL.md). * Boundary markers: Explicit boundary markers for untrusted data are absent in the provided instructions. * Capability inventory: The skill has the capability to execute shell commands (Git) and perform file system operations within the user's home directory. * Sanitization: There is no explicit mention of input sanitization or validation. However, the risk is mitigated by the requirement for manual user intervention (CAPTCHA-protected submission and manual fork creation) before any external state change occurs.
Audit Metadata