asc-iap

Pass

Audited by Gen Agent Trust Hub on Mar 14, 2026

Risk Level: SAFE
Full Analysis
  • [COMMAND_EXECUTION]: The skill uses the asc CLI tool to perform administrative tasks such as creating and listing In-App Purchases. The command patterns are specific to the tool's intended functionality and do not exhibit dangerous execution patterns like arbitrary shell injection or unauthorized privilege escalation.
  • [INDIRECT_PROMPT_INJECTION]: The skill defines a small attack surface for indirect prompt injection by reading local configuration data.
  • Ingestion points: Reads the appId from a local .asc/project.json file.
  • Boundary markers: None explicitly defined, but operations are limited to specific CLI command arguments.
  • Capability inventory: The skill can execute asc commands and use jq to parse JSON output.
  • Sanitization: Example workflows demonstrate the use of shell variable quoting (e.g., "$APP_ID") to handle values extracted from files.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 14, 2026, 06:21 AM