livewire-development
Fail
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (HIGH): The skill is designed to run 'php artisan' commands through the '$assist->artisanCommand()' function. This capability allows the agent to create files and execute system-level logic. If an attacker provides a component name containing shell metacharacters, it could lead to arbitrary command execution on the host.
- [PROMPT_INJECTION] (HIGH): The skill exhibits an Indirect Prompt Injection surface (Category 8) by ingesting untrusted user data to drive operations with side effects.
- Ingestion points: User-provided component names and descriptions used in SKILL.md templates.
- Boundary markers: No delimiters or instructions are present to prevent the agent from obeying instructions embedded in the data.
- Capability inventory: Command execution and file system modification through the artisan tool.
- Sanitization: The skill contains no instructions for validating or escaping user input before it is used as a command argument.
Recommendations
- AI detected serious security threats
Audit Metadata