pulumi-esc
Pass
Audited by Gen Agent Trust Hub on Feb 19, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- Indirect Prompt Injection (LOW): The skill exhibits a vulnerability surface where untrusted instructions from external documentation could potentially influence agent behavior. Ingestion points: The
web-fetchtool is used to ingest content from severalhttps://www.pulumi.com/documentation URLs. Boundary markers: Absent; there are no instructions to the agent to delimit or treat the fetched content as potentially unsafe. Capability inventory: The skill utilizespulumi env runfor shell command execution andcall_pulumi_cloud_api()for cloud management operations. Sanitization: Absent; the agent is instructed to use the fetched documentation directly to generate configurations and guide the user. - External Downloads (LOW): The skill triggers the retrieval of data from
https://www.pulumi.com/. While this is the official documentation for the tool being managed, the domain is not included in the predefined trusted external sources list. - Command Execution (SAFE): The skill provides legitimate instructions for using the Pulumi CLI and managing ESC environments. The
pulumi env runcommand is used for its primary intended purpose of running processes with injected environment variables.
Audit Metadata