octivi-bash-boilerplate

Pass

Audited by Gen Agent Trust Hub on Mar 13, 2026

Risk Level: SAFECOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill instructs the agent to execute maintenance scripts and update utilities provided by the vendor.
  • Evidence: SKILL.md and workflow.md direct the agent to run octivi-bash-boilerplate-update to synchronize code markers and scripts/generate-skill-templates to maintain asset payloads.\n- [REMOTE_CODE_EXECUTION]: One of the provided templates utilizes dynamic sourcing to load its library, which allows for runtime execution of external code.
  • Evidence: The full-obb-script-source template resolves the obb_lib_path via environment variables or command discovery before performing source "${obb_lib_path}". While this is a standard pattern for the OBB library, it involves dynamic path evaluation for code execution.\n- [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface as it processes user-provided logic to generate executable scripts.
  • Ingestion points: Untrusted script intent, CLI contracts, and business logic descriptions enter the context via SKILL.md.
  • Boundary markers: The system uses # >>> OBB:BEGIN and # <<< OBB:END blocks to delimit boilerplate from user logic, though these are structural rather than security-enforcing.
  • Capability inventory: The agent can write files and execute the OBB update tool on the resulting scripts.
  • Sanitization: There is no explicit sanitization or validation of the user-provided logic before it is incorporated into scripts and passed to validation tools.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 13, 2026, 06:52 PM