model-usage
Pass
Audited by Gen Agent Trust Hub on Mar 3, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/model_usage.pyexecutes thecodexbarCLI tool viasubprocess.check_output. The command arguments are constructed using a fixed list where theprovidervariable is strictly validated against a whitelist of choices (codex,claude), preventing arbitrary command injection. - [EXTERNAL_DOWNLOADS]: The skill requires the installation of the
codexbarCLI through a third-party Homebrew tap (steipete/tap/codexbar). While this is the official distribution method for the tool, it introduces a dependency on an external repository not included in the trusted vendors list. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection if it processes maliciously crafted cost logs.
- Ingestion points: The
load_payloadfunction inscripts/model_usage.pyreads JSON-formatted usage data from user-specified files or standard input. - Boundary markers: The script output does not use delimiters or instructions to prevent the agent from obeying instructions that might be embedded in model name fields within the logs.
- Capability inventory: The skill's capabilities are limited to reading local files and executing the
codexbarbinary; it does not have network access or the ability to write to the filesystem based on the data processed. - Sanitization: While the script validates the JSON structure, it does not sanitize or escape string content (such as model names) before printing it to the console for agent consumption.
Audit Metadata