livewire-development

Fail

Audited by Gen Agent Trust Hub on Feb 15, 2026

Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION] (HIGH): The skill is designed to run 'php artisan' commands through the '$assist->artisanCommand()' function. This capability allows the agent to create files and execute system-level logic. If an attacker provides a component name containing shell metacharacters, it could lead to arbitrary command execution on the host.
  • [PROMPT_INJECTION] (HIGH): The skill exhibits an Indirect Prompt Injection surface (Category 8) by ingesting untrusted user data to drive operations with side effects.
  • Ingestion points: User-provided component names and descriptions used in SKILL.md templates.
  • Boundary markers: No delimiters or instructions are present to prevent the agent from obeying instructions embedded in the data.
  • Capability inventory: Command execution and file system modification through the artisan tool.
  • Sanitization: The skill contains no instructions for validating or escaping user input before it is used as a command argument.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 15, 2026, 10:33 PM