ha-validate
Warn
Audited by Gen Agent Trust Hub on Feb 23, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill interpolates the 'path' argument directly into multiple shell commands (e.g.,
find {{ path or '.' }},grep ... {{ path or '.' }}) without sanitization. This creates a vulnerability where a malicious path string could be used to execute arbitrary shell commands on the host system. - [DATA_EXFILTRATION]: The skill explicitly targets and reads
secrets.yaml, a sensitive file containing credentials and private data for Home Assistant. It extracts defined secret keys to verify usage, which could expose sensitive identifiers if the validation output is compromised. - [PROMPT_INJECTION]: The skill processes the content of local YAML files to generate validation reports, representing an indirect prompt injection surface.
- Ingestion points: Reads local file content using
find,grep, and Python file-reading operations on*.yamlfiles. - Boundary markers: No delimiters or protective instructions are used when passing file contents or validation errors to the agent for reporting.
- Capability inventory: Access to
Bash(includingpython3,docker exec, andhaCLI),Read,Grep, andGlobtools. - Sanitization: None. The skill does not validate or sanitize the
pathargument or the content of the files it processes.
Audit Metadata