systematic-debugging
Pass
Audited by Gen Agent Trust Hub on Apr 3, 2026
Risk Level: SAFE
Full Analysis
- [COMMAND_EXECUTION]: The skill provides examples of shell commands for gathering diagnostic information. This includes checking environment variables and system keychain status on macOS (e.g.,
security list-keychains). These are standard troubleshooting steps for build and code-signing issues and are documented as informative examples.\n- [DATA_EXPOSURE]: Diagnostic examples involve inspecting environment variables and keychain identities. These access sensitive local configuration for troubleshooting, but the skill does not include instructions for external transmission of this data.\n- [PROMPT_INJECTION]: The debugging framework involves processing external data like error messages, stack traces, and git diffs, which is a standard attack surface for indirect prompt injection in diagnostic tools. Evidence chain:\n - Ingestion points: Error messages, stack traces, and git diffs (Phase 1, SKILL.md).\n
- Boundary markers: Absent.\n
- Capability inventory: Shell execution via
bash,npm, orbun(Phase 1.4, Phase 4, SKILL.md).\n - Sanitization: Absent.
Audit Metadata