hyperstack-build
Pass
Audited by Gen Agent Trust Hub on Feb 26, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONDATA_EXFILTRATIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: Installs the
hyperstack-cliutility viacargo installornpm installas part of the project setup. - [COMMAND_EXECUTION]: Executes shell commands through the
hsCLI andcargofor building Rust projects and managing stack deployments as described inSKILL.md. - [DATA_EXFILTRATION]: The
hs upcommand is used to deploy locally developed stack code and configurations to the vendor's cloud infrastructure. - [CREDENTIALS_UNSAFE]: The
hs auth logincommand handles API keys for account authentication, which are provided via command-line flags or interactive prompts. - [PROMPT_INJECTION]: The skill processes Solana IDL files sourced from external locations, which represents an indirect prompt injection surface.
- Ingestion points: IDL JSON files located in the
idl/directory, as referenced in the stack definition module inSKILL.md. - Boundary markers: No specific boundary markers or "ignore instructions" warnings are identified for the data processing pipeline.
- Capability inventory: Deployment capabilities via
hs upand build operations viacargo buildare available to the skill. - Sanitization: No explicit sanitization or schema validation for external IDL content is mentioned in the documentation.
Audit Metadata