mcu-rtt-debugger
Pass
Audited by Gen Agent Trust Hub on Apr 23, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/rtt_control.pyscript executes theJLinkRTTLoggerbinary and shell commands usingsubprocess.Popento manage debugging sessions. - [COMMAND_EXECUTION]: A background timer in
scripts/rtt_control.pyis implemented usingsubprocess.Popenwithshell=True, which is a security anti-pattern for command execution. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection. It ingests untrusted log data from the target MCU via
scripts/analyze_log.pyand presents it to the AI agent without sanitization or boundary markers. This could allow malicious firmware to inject instructions into the agent's context through the RTT log stream.
Audit Metadata