env-and-assets-bootstrap
Pass
Audited by Gen Agent Trust Hub on May 20, 2026
Risk Level: SAFEREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill facilitates the installation of dependencies from a target repository using commands like
pip install -e .orpip install -r requirements.txt. This allows a target repository to execute arbitrary code on the host system during the installation process throughsetup.pyscripts or malicious dependency specifications. - [COMMAND_EXECUTION]: The
scripts/bootstrap_env.pyandscripts/plan_setup.pyscripts generate and execute shell commands to manage environments. Although commands are executed via list-based subprocess calls to avoid shell injection, the skill performs significant system-level operations. - [PROMPT_INJECTION]: The
scripts/prepare_assets.pyscript parsesREADME.mdand configuration files from the target repository to extract setup hints. This data is returned to the agent without sanitization, creating an attack surface for indirect prompt injection where malicious instructions in a repository's documentation could influence the agent's behavior. - Ingestion points:
scripts/prepare_assets.pyreadsREADME.md,README, and files inconfigs/orconfig/directories. - Boundary markers: The extracted strings are placed into a JSON manifest but lack explicit delimiters or instructions for the agent to ignore embedded instructions.
- Capability inventory: The skill includes environment creation and dependency installation via
subprocess.runinscripts/bootstrap_env.py. - Sanitization: No sanitization or filtering is performed on the extracted text beyond keyword matching.
Audit Metadata