graphicode-start-ts-bun
Pass
Audited by Gen Agent Trust Hub on Mar 12, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses
catto read the project configuration fromgraphig.jsonandls -dto identify directories for states and flows. These commands are used to gather data for code generation. - [PROMPT_INJECTION]: The skill displays an indirect prompt injection vulnerability surface through its code generation process.
- Ingestion points: Data is ingested from the
./graphig.jsonfile and through directory names retrieved from the file system usingls. - Boundary markers: The skill lacks any boundary markers or directives that isolate the ingested data from the TypeScript code template used to generate the launcher script.
- Capability inventory: The skill is designed to write and update the
<entryDir>/launcher.tsfile, which is an executable part of the user's project environment. - Sanitization: There is no sanitization or validation of the configuration fields or directory names before they are interpolated into the
launcher.tsfile as imports and method calls, meaning a malicious project structure could inject unintended logic into the generated code.
Audit Metadata