sapiom-deploy
Pass
Audited by Gen Agent Trust Hub on Mar 3, 2026
Risk Level: SAFECOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses
child_process.execSyncto run thezipcommand locally to package source code for deployment as detailed inreferences/jobs.md. - [REMOTE_CODE_EXECUTION]: Provides an API and workflows to deploy and execute arbitrary Node.js scripts on Sapiom's managed infrastructure (
blaxel.services.sapiom.ai). - [CREDENTIALS_UNSAFE]: Handles the
SAPIOM_API_KEYto authenticate against vendor gateways and injects it into the environment variables of deployed jobs and sandboxes. - [EXTERNAL_DOWNLOADS]: The deployment process automatically installs Node.js dependencies (e.g.,
@sapiom/fetch,@blaxel/core) from the NPM registry as part of the remote build step. - [PROMPT_INJECTION]: An indirect prompt injection surface is identified in the orchestrator pattern where untrusted data from external websites is ingested.
- Ingestion points:
references/patterns.mduses Firecrawl to scrape external URLs. - Boundary markers: No explicit delimiters or instructions to ignore embedded commands are present in the provided scraping example.
- Capability inventory: Local
execSyncfor packaging and remote deployment/execution (RCE) via the Jobs API. - Sanitization: There is no evidence of sanitization or validation of the scraped data before it is used to determine worker task payloads.
Audit Metadata