debugger-python
Warn
Audited by Gen Agent Trust Hub on Mar 4, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill provides an
evaluatecommand that executes arbitrary Python expressions within the context of the application being debugged. - This capability allows for complete code execution within the target process.
- Evidence: In
scripts/debug.py, theevaluateaction callssession.inspect(expression=argv[2]). - [COMMAND_EXECUTION]: The skill manages the lifecycle of external Python processes and can execute them with arbitrary file paths provided via CLI arguments.
- Evidence: The
startandprobeactions inscripts/debug.pylaunch Python scripts provided as command-line arguments. - [EXTERNAL_DOWNLOADS]: The skill requires the installation of the
debugpylibrary, a well-known debugging tool maintained by Microsoft. - Evidence:
SKILL.mdinstructs the user topip install debugpy. - [PROMPT_INJECTION]: The skill exposes a surface for indirect prompt injection by accepting arbitrary expressions and file paths that are executed or processed at runtime.
- Ingestion points: Command-line arguments in
scripts/debug.pyused for theevaluate,start, andprobeactions. - Boundary markers: None provided in the command interface to distinguish instructions from data.
- Capability inventory: Includes arbitrary code execution (
evaluate), process management (start), and variable inspection. - Sanitization: No input validation or sanitization is performed on the provided expressions before they are passed to the debugger session.
Audit Metadata