asc-check-readiness

Warn

Audited by Gen Agent Trust Hub on Mar 14, 2026

Risk Level: MEDIUMCOMMAND_EXECUTION
Full Analysis
  • [COMMAND_EXECUTION]: The provided CI Gate Script contains a pattern that dynamically executes shell commands based on the output of an external tool.
  • Evidence: The script in SKILL.md uses eval "$(echo "$RESULT" | jq -r '.data[0].affordances.submit')" to execute a command string fetched from the asc CLI tool.
  • Risk: This pattern is vulnerable to indirect injection. If the asc tool's data source (e.g., the App Store Connect API) or the tool itself returns a malicious payload in the affordances.submit field, the script will execute it without validation.
  • [COMMAND_EXECUTION]: The skill ingests untrusted data from an external API (via the asc tool) and uses it to drive subsequent actions.
  • Ingestion points: Output of asc versions check-readiness (processed in SKILL.md).
  • Boundary markers: None present; the script directly pipes tool output into an execution context.
  • Capability inventory: Shell command execution via eval.
  • Sanitization: No sanitization or validation is performed on the affordances.submit string before execution.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 14, 2026, 06:21 AM