terraform-best-practices
Fail
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION] (HIGH): In the file
rules/language-linting.md, the skill instructs the agent to install TFLint using acurl | bashcommand targeting a remote script. This pattern executes unverified code and is a major security risk. - [PROMPT_INJECTION] (HIGH): Indirect Prompt Injection vulnerability. The skill is designed to process external Terraform code for reviews and refactoring. This is a Tier 1 surface (high capability) that lacks boundary markers or instructions to ignore embedded instructions, making the agent susceptible to manipulation by malicious code comments.
- [COMMAND_EXECUTION] (MEDIUM): Multiple rules including
rules/resource-immutable.mdandrules/org-audit-logging.mdsuggest the use oflocal-execprovisioners to execute shell commands likedocker build,docker push, and file system operations. - [EXTERNAL_DOWNLOADS] (MEDIUM): The documentation refers to several non-whitelisted external repositories and packages, such as
antonbabenko/pre-commit-terraformandtflint-ruleset-aws, which would be downloaded if the agent follows the guidelines.
Recommendations
- AI detected serious security threats
Audit Metadata