digitalocean-coder
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [Privilege Escalation] (MEDIUM): The skill templates configure a user with passwordless sudo access.
- Evidence: In
SKILL.md, the cloud-init configuration for the 'deploy' user includessudo: ALL=(ALL) NOPASSWD:ALL. This allows any process running as that user to execute administrative commands without authentication. - [Data Exposure & Exfiltration] (MEDIUM): The skill references sensitive local file paths to manage SSH keys.
- Evidence:
SKILL.mduses the HCL functionfile("~/.ssh/deploy.pub"). Accessing the~/.sshdirectory is a sensitive operation that can lead to credential exposure if the path is manipulated. - [Indirect Prompt Injection] (LOW): The skill is vulnerable to indirect prompt injection due to unvalidated variable interpolation into configurations.
- Ingestion points: Variable inputs such as
var.project,var.environment, andvar.deploy_ssh_keyinSKILL.md. - Boundary markers: Absent.
- Capability inventory: The skill allows the use of
Bash,Write, andEdittools. - Sanitization: Absent; external data is interpolated directly into HCL and cloud-init scripts without escaping, which could allow an attacker to inject malicious commands if they control the variable values.
Audit Metadata