pipes-troubleshooting
Warn
Audited by Gen Agent Trust Hub on Mar 26, 2026
Risk Level: MEDIUMCREDENTIALS_UNSAFECOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The skill directs the agent to access and read
.envfiles and environment variables to verify connection strings and database credentials. - Evidence: In
SKILL.md, Error Pattern 3 specifically instructs the agent to runcat .envand check for ClickHouse authentication details. - [COMMAND_EXECUTION]: The skill utilizes the Bash tool for a wide range of operations, including process management, container interaction, and file modification.
- Evidence: Extensive use of
ps aux,docker ps, anddocker execcommands for investigating runtime issues. - Evidence: Provides a complex
sedcommand inSKILL.md(Error Pattern 11) andPATTERNS.md(Issue 6) to perform in-place patching of a script within the user's npm cache (~/.npm/_npx). - [REMOTE_CODE_EXECUTION]: The instructions encourage the use of package managers and remote execution tools to resolve dependency issues and generate code.
- Evidence: Recommends running
npm install,bun install, andnpx @subsquid/evm-typegen@latestto fix version mismatches and update ABIs. - [PROMPT_INJECTION]: The skill is designed to ingest and process untrusted data from log files and error stack traces, which serves as a potential vector for indirect prompt injection.
- Ingestion points: Error stack traces captured via
BashOutputand log files read using theReadtool. - Boundary markers: No explicit markers or "ignore instructions" warnings are present for processed data.
- Capability inventory: The agent has powerful tools including
Edit,Bash, andGrepwhich could be abused if the agent follows instructions hidden in error logs. - Sanitization: No sanitization or validation of the ingested log content is performed before processing.
Audit Metadata