dbg
Pass
Audited by Gen Agent Trust Hub on Apr 11, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
dbg launchanddbg attachcommands provide the agent with the ability to execute arbitrary processes or attach to existing ones, which can be leveraged to run unauthorized code in the host environment. - [DATA_EXFILTRATION]: The
dbg attachcommand allows connection to arbitrary WebSocket URLs, facilitating potential data transfer to external, non-whitelisted endpoints. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it ingests and displays untrusted data from external sources (process logs via
dbg consoleand source code viadbg stateordbg source) without sanitization. - Ingestion points:
dbg console,dbg state,dbg source, anddbg eval(reads runtime state and files). - Boundary markers: Absent; there are no instructions to the agent to ignore commands found within debugged output.
- Capability inventory:
dbg launch,dbg attach,dbg set, anddbg evalprovide extensive system and process control. - Sanitization: Absent; the skill does not attempt to filter or escape the content retrieved from the debugged environment.
Audit Metadata