systematic-debugging

Pass

Audited by Gen Agent Trust Hub on Apr 3, 2026

Risk Level: SAFE
Full Analysis
  • [COMMAND_EXECUTION]: The skill provides examples of shell commands for gathering diagnostic information. This includes checking environment variables and system keychain status on macOS (e.g., security list-keychains). These are standard troubleshooting steps for build and code-signing issues and are documented as informative examples.\n- [DATA_EXPOSURE]: Diagnostic examples involve inspecting environment variables and keychain identities. These access sensitive local configuration for troubleshooting, but the skill does not include instructions for external transmission of this data.\n- [PROMPT_INJECTION]: The debugging framework involves processing external data like error messages, stack traces, and git diffs, which is a standard attack surface for indirect prompt injection in diagnostic tools. Evidence chain:\n
  • Ingestion points: Error messages, stack traces, and git diffs (Phase 1, SKILL.md).\n
  • Boundary markers: Absent.\n
  • Capability inventory: Shell execution via bash, npm, or bun (Phase 1.4, Phase 4, SKILL.md).\n
  • Sanitization: Absent.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 3, 2026, 02:37 AM