audit-env-variables
Pass
Audited by Gen Agent Trust Hub on Mar 5, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes the
Bashtool to executenpm run buildandnpm test(SKILL.md, Step 9). These commands are run locally to validate that the project continues to function correctly after any environment variable deletions during the cleanup phase. This is an intended safety feature of the skill. - [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface because it reads and processes external project files, including environment configurations and source code (SKILL.md, Steps 1-3).
- Ingestion points: The skill ingests
.env*files and source files (.js,.ts) using theGrepandReadtools. - Boundary markers: No specific delimiters or "ignore embedded instructions" warnings are implemented in the prompt logic to differentiate file content from system instructions.
- Capability inventory: The agent has access to
Bash(command execution),Write/Edit(file modification), andAskUserQuestion(interactive confirmation). - Sanitization: Ingested file contents are analyzed for patterns without explicit sanitization to filter potential injection attempts embedded in code comments or strings.
- [DATA_EXFILTRATION]: The skill is designed to read sensitive files such as
.envand.env.localas part of its primary auditing purpose (SKILL.md, Step 1). However, the skill only generates local reports and does not utilize any network tools or communicate with external domains to transmit the discovered sensitive data.
Audit Metadata