configure-container
Pass
Audited by Gen Agent Trust Hub on Apr 21, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes shell command substitution in the
Contextsection to perform automated file discovery at load time. It executesfindcommands to locate Dockerfiles, GitHub workflows, and project manifest files within the repository. These operations are restricted to the project directory and are used for identification purposes. - [PROMPT_INJECTION]: The skill has an indirect prompt injection surface because it ingests untrusted data from project files and uses that information to drive file system modifications.
- Ingestion points: Reads local project files identified in Step 1, including
Dockerfile,.github/workflows/*.yml,package.json, andpyproject.toml(SKILL.md). - Boundary markers: None identified. Content from analyzed files is not isolated with delimiters or instructions to ignore embedded commands.
- Capability inventory: The skill is authorized to use
WriteandEdittools to create or update project configuration files, workflows, and standards tracking (SKILL.md). - Sanitization: There is no evidence of sanitization or validation for the content read from external files before it is processed by the agent's logic.
- [EXTERNAL_DOWNLOADS]: The skill retrieves version metadata from well-known registries and services. It uses
WebSearchandWebFetchto check for the latest LTS and stable versions of Docker base images (Node.js, Python, nginx) and security tools such as Trivy on Docker Hub and GitHub.
Audit Metadata