moai-lang-php

Pass

Audited by Gen Agent Trust Hub on Feb 18, 2026

Risk Level: SAFE
Full Analysis
  • [PROMPT_INJECTION] (SAFE): No instructions attempting to override agent behavior, bypass safety filters, or extract system prompts were detected. The skill uses natural instructional language for code generation.
  • [COMMAND_EXECUTION] (SAFE): The Bash commands provided in the troubleshooting section (e.g., php -v, composer dump-autoload, php artisan cache:clear) are standard industry practices for PHP development and do not involve privilege escalation or dangerous parameters.
  • [DATA_EXFILTRATION] (SAFE): The skill does not reference sensitive file paths (like ~/.ssh or .env) or attempt to send data to external domains. File system tools (Read, Grep, Glob) are used contextually for project analysis.
  • [EXTERNAL_DOWNLOADS] (SAFE): References to Composer and specific frameworks are standard dependencies for the PHP ecosystem. There are no patterns involving piping remote scripts to shells (e.g., curl | bash).
  • [Indirect Prompt Injection] (SAFE):
  • Ingestion points: The skill triggers on .php files, composer.json, and symfony.yaml.
  • Boundary markers: None explicitly defined in the pattern instructions.
  • Capability inventory: Includes Bash execution and file reading capabilities.
  • Sanitization: No specific sanitization logic is present, but the scope is limited to development diagnostics.
  • [DYNAMIC_EXECUTION] (SAFE): While the skill assists in generating PHP code, it does not involve runtime compilation or unsafe deserialization (e.g., pickle/marshal) within the agent's own execution context.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 18, 2026, 12:14 PM