veld-usage
Fail
Audited by Gen Agent Trust Hub on Mar 20, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [PRIVILEGE_ESCALATION]: The
veld setupcommand is explicitly documented as requiringsudoprivileges to perform system-level operations, including installing the Caddy web server and trusting TLS certificates. - [PERSISTENCE_MECHANISMS]: The
veld setupcommand installs background daemon and helper services that persist on the host system to manage dev environments. - [DATA_EXPOSURE_AND_EXFILTRATION]: The
veld status --outputscommand displays sensitive node outputs, specifically including environment variables and port mappings. - [INDIRECT_PROMPT_INJECTION]: The skill ingests external data from several sources that could be manipulated to influence agent behavior.
- Ingestion points: The skill reads project configuration from
veld.jsonand retrieves service logs viaveld logs. - Boundary markers: No boundary markers or instructions to ignore embedded content are used when processing these data sources.
- Capability inventory: The skill can execute a wide range of host commands via the
veldCLI. - Sanitization: There is no evidence of sanitization or validation of the content retrieved from logs or local configuration files.
- [DYNAMIC_EXECUTION]: The Veld CLI acts as an orchestrator that executes processes and services defined dynamically in the local
veld.jsonconfiguration file. - [UNVERIFIABLE_DEPENDENCIES_AND_REMOTE_CODE_EXECUTION]: The
veld updatecommand allows for downloading and installing software updates for the CLI tool from the developer's infrastructure.
Recommendations
- AI detected serious security threats
Audit Metadata