sprites-dev
Pass
Audited by Gen Agent Trust Hub on Mar 12, 2026
Risk Level: SAFECOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes the
sprite execcommand to run arbitrary shell commands and binaries on remote Sprite VMs, giving the agent full administrative control over the remote environment. - [REMOTE_CODE_EXECUTION]: The core functionality of the skill is to facilitate the execution of code on external infrastructure (Fly.io VMs) through a local CLI interface.
- [EXTERNAL_DOWNLOADS]: The skill provides instructions for transferring files and data between the local environment and remote VMs using commands like
catandbase64, which can be used to move sensitive information or deploy external payloads. - [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection attack surface (Category 8). Evidence: 1. Ingestion points: The agent reads untrusted data from the remote VM via
sprite execoutput, including file contents from/home/sprite/and log files from/.sprite/logs/. 2. Boundary markers: No delimiters or specific instructions are provided to help the agent distinguish between remote data and its own system instructions. 3. Capability inventory: The agent has the ability to execute arbitrary commands, destroy VMs viasprite destroy, and modify network authentication/policies viasprite url updateand the REST API. 4. Sanitization: No sanitization or validation of the remote output is performed before processing.
Audit Metadata