debugger-nodejs
Warn
Audited by Gen Agent Trust Hub on Mar 3, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The
scripts/init.pyscript automatically executes apip installcommand for thetop-coder-ai-skills-debuggerpackage. This dependency is not from a trusted vendor list and is installed without version pinning, posing a risk of supply chain attack if the package is compromised. - [COMMAND_EXECUTION]: The
scripts/debug.pyscript enables the execution of Node.js programs and supports anevaluateaction. This allows the agent to run arbitrary JavaScript code within the debugged environment, which could be exploited to perform unauthorized operations if the agent is manipulated. - [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface by ingesting and processing runtime data that could be controlled by an attacker.
- Ingestion points: The skill reads and returns stack traces, local variables, and evaluation results to the agent via
scripts/debug.py. - Boundary markers: No explicit delimiters or safety instructions are used to separate debugger output from system instructions.
- Capability inventory: The agent context associated with this skill likely possesses file system and network access, which could be targeted via instructions embedded in debugged data.
- Sanitization: There is no evidence of sanitization or filtering of the content retrieved from the Node.js runtime environment.
Audit Metadata