vscode-httpyac-config
Pass
Audited by Gen Agent Trust Hub on Mar 3, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill provides numerous examples and templates that involve executing JavaScript within the httpYac environment. This includes the use of Node.js built-in modules such as
fsfor file system operations likefs.writeFileSyncandfs.readFileSync(documented inreferences/ADVANCED_FEATURES.md) andchild_processfor executing shell commands, specifically the use of thesecuritycommand to fetch macOS keychain secrets inreferences/SECURITY.md. - [DATA_EXFILTRATION]: The skill's primary function is to handle and transmit API credentials and tokens. While it emphasizes security best practices like using
.envfiles and.gitignore, the operational logic involves sending sensitive data to remote API endpoints and potentially logging truncated versions of these secrets as seen inreferences/AUTHENTICATION_PATTERNS.md. - [PROMPT_INJECTION]: The skill is designed to ingest and process external data, such as Swagger/OpenAPI specifications or Postman collections (identified in
SKILL.md), to generate executable test scripts. This workflow presents an indirect prompt injection surface where malicious instructions embedded in the source documentation could influence the generated code or subsequent agent actions. Mandatory Evidence: Ingestion points include API specs and documentation URLs; Boundary markers are absent in generated files; Capabilities include network (axios), file system (fs), and shell (exec); Sanitization is not explicitly implemented during code generation. - [EXTERNAL_DOWNLOADS]: The documentation references and provides instructions for installing the
httpyacCLI tool and various Node.js dependencies (e.g.,axios,chai,faker,ajv) from the NPM registry. These are well-known packages and tools within the developer ecosystem and are treated as safe references.
Audit Metadata