investigate
Fail
Audited by Gen Agent Trust Hub on Feb 22, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE] (HIGH): The skill instructions explicitly direct the agent to access production environment variables and secrets using
npx convex env list --prodandvercel env ls. It specifically highlights the validation of sensitive patterns such assk_*(Secret Keys) andwhsec_*(Webhook Secrets). - [COMMAND_EXECUTION] (MEDIUM): The skill uses
codex execto run investigations. This pattern executes commands derived from potentially untrusted error messages or bug reports, creating a risk of command injection. - [DATA_EXFILTRATION] (LOW): The toolkit includes
curlfor testing endpoints. In combination with the ability to read production secrets, this could be used to exfiltrate sensitive data to external attacker-controlled servers. - [PROMPT_INJECTION] (LOW): The skill is vulnerable to Indirect Prompt Injection (Category 8).
- Ingestion points: User-provided bug reports via
$ARGUMENTS. - Boundary markers: None present to distinguish instructions from data.
- Capability inventory: High-privilege access to production CLI tools (
vercel,convex,sentry-cli) and dynamic execution (codex exec). - Sanitization: No evidence of sanitization or validation of the input arguments before they are interpolated into command strings.
Recommendations
- AI detected serious security threats
Audit Metadata