peach-setup-harness
Pass
Audited by Gen Agent Trust Hub on Apr 28, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes shell commands (
cat,ls,grep,head) to inspect the project structure, detect technology stacks (Koa vs Elysia, MySQL vs PostgreSQL), and audit the contents of configuration files likeCLAUDE.mdandAGENTS.md.- [COMMAND_EXECUTION]: Per its defined workflow, the skill modifies the local file system by cleaning upCLAUDE.md, updatingAGENTS.mdwith template content, and deleting legacy configuration directories like.cursor/rules/.- [DATA_EXFILTRATION]: The skill inspects the project's environment file (api/env.local.yml) usinggrepto identify the database provider. This is used for configuration purposes only, and no data is transmitted to external servers.- [PROMPT_INJECTION]: The skill processes untrusted external data by reading and potentially incorporating sections ofCLAUDE.mdandAGENTS.mdinto the agent's context. While this presents an attack surface for indirect prompt injection, the skill's logic focuses on replacing redundant content with trusted internal templates. (1) Ingestion points:CLAUDE.md,AGENTS.md, and source code files (controller/dao) are read during the analysis phase. (2) Boundary markers: No explicit boundary markers or 'ignore' instructions are used when processing existing file content. (3) Capability inventory: The skill has the capability to read files (cat), list directories (ls), and delete files/directories (rm). (4) Sanitization: No sanitization or validation of the input file content is performed before processing.
Audit Metadata