moai-lang-php
Pass
Audited by Gen Agent Trust Hub on Feb 18, 2026
Risk Level: SAFE
Full Analysis
- [PROMPT_INJECTION] (SAFE): No instructions attempting to override agent behavior, bypass safety filters, or extract system prompts were detected. The skill uses natural instructional language for code generation.
- [COMMAND_EXECUTION] (SAFE): The Bash commands provided in the troubleshooting section (e.g.,
php -v,composer dump-autoload,php artisan cache:clear) are standard industry practices for PHP development and do not involve privilege escalation or dangerous parameters. - [DATA_EXFILTRATION] (SAFE): The skill does not reference sensitive file paths (like ~/.ssh or .env) or attempt to send data to external domains. File system tools (Read, Grep, Glob) are used contextually for project analysis.
- [EXTERNAL_DOWNLOADS] (SAFE): References to Composer and specific frameworks are standard dependencies for the PHP ecosystem. There are no patterns involving piping remote scripts to shells (e.g., curl | bash).
- [Indirect Prompt Injection] (SAFE):
- Ingestion points: The skill triggers on .php files, composer.json, and symfony.yaml.
- Boundary markers: None explicitly defined in the pattern instructions.
- Capability inventory: Includes Bash execution and file reading capabilities.
- Sanitization: No specific sanitization logic is present, but the scope is limited to development diagnostics.
- [DYNAMIC_EXECUTION] (SAFE): While the skill assists in generating PHP code, it does not involve runtime compilation or unsafe deserialization (e.g., pickle/marshal) within the agent's own execution context.
Audit Metadata