veld-usage

Fail

Audited by Gen Agent Trust Hub on Mar 20, 2026

Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
  • [PRIVILEGE_ESCALATION]: The veld setup command is explicitly documented as requiring sudo privileges to perform system-level operations, including installing the Caddy web server and trusting TLS certificates.
  • [PERSISTENCE_MECHANISMS]: The veld setup command installs background daemon and helper services that persist on the host system to manage dev environments.
  • [DATA_EXPOSURE_AND_EXFILTRATION]: The veld status --outputs command displays sensitive node outputs, specifically including environment variables and port mappings.
  • [INDIRECT_PROMPT_INJECTION]: The skill ingests external data from several sources that could be manipulated to influence agent behavior.
  • Ingestion points: The skill reads project configuration from veld.json and retrieves service logs via veld logs.
  • Boundary markers: No boundary markers or instructions to ignore embedded content are used when processing these data sources.
  • Capability inventory: The skill can execute a wide range of host commands via the veld CLI.
  • Sanitization: There is no evidence of sanitization or validation of the content retrieved from logs or local configuration files.
  • [DYNAMIC_EXECUTION]: The Veld CLI acts as an orchestrator that executes processes and services defined dynamically in the local veld.json configuration file.
  • [UNVERIFIABLE_DEPENDENCIES_AND_REMOTE_CODE_EXECUTION]: The veld update command allows for downloading and installing software updates for the CLI tool from the developer's infrastructure.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Mar 20, 2026, 04:08 PM