debug-mode
Pass
Audited by Gen Agent Trust Hub on Mar 13, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Uses local shell commands and a dynamically generated Node.js server to facilitate log collection and analysis.\n
- Evidence:
node -escript used to create an HTTP server inSKILL.mdandreferences/common.md.\n - Evidence: Use of
rm -f debug.log,cat,jq, andgrepfor file management and data processing.\n- [COMMAND_EXECUTION]: The generated Node.js collector server employs an insecure CORS policy, potentially allowing third-party websites to inject data into the local log file.\n - Evidence:
s.setHeader('Access-Control-Allow-Origin','*')in the server script found inSKILL.md.\n- [PROMPT_INJECTION]: Vulnerable to indirect prompt injection as it processes and interprets untrusted log data generated by the application being debugged.\n - Ingestion points:
debug.logfile specified inSKILL.md.\n - Boundary markers: Absent; the agent reads raw JSON lines from the log file without delimiters.\n
- Capability inventory: The skill has access to shell commands like
node,rm,cat,jq, andgrepas documented inSKILL.md.\n - Sanitization: Absent; log contents are not sanitized or validated before processing.
Audit Metadata