steedos-server-moleculer
Pass
Audited by Gen Agent Trust Hub on Apr 25, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill describes an architecture for handling events from external sources such as metadata changes and record events, which creates an indirect prompt injection surface.\n
- Ingestion points: Event handlers defined in
src/app.moleculer.ts(e.g.,$metadata.*,@objectRecordEvent.*.*).\n - Boundary markers: No specific boundary delimiters or instruction-ignore warnings are described in the handlers.\n
- Capability inventory: The service utilizes
broker.call,broker.emit, andbroker.broadcastto interact with other system components.\n - Sanitization: The provided code snippets do not illustrate sanitization or validation of the event payloads before they are forwarded to the WebSocket gateway.\n- [COMMAND_EXECUTION]: The documentation provides examples of using
broker.callwith theobjectql.directFindaction, explicitly noting that this method bypasses standard permission layers to query database records directly.
Audit Metadata