phoenix-framework
Warn
Audited by Gen Agent Trust Hub on Feb 21, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [Remote Code Execution] (HIGH): The
project_evaltool allows the AI agent to execute arbitrary Elixir code within the running application runtime. (File: references/tidewave.md)\n- [Command Execution] (HIGH): Theexecute_sql_querytool enables direct SQL execution against the application's database. (File: references/tidewave.md)\n- [Data Exposure & Exfiltration] (MEDIUM): Theget_logstool exposes server logs, which may contain sensitive runtime data or environment secrets. (File: references/tidewave.md)\n- [Unverifiable Dependencies] (MEDIUM): The installation process requires downloading packages from Hex (tidewave,igniter_new), which are not in the trusted source list. (File: references/tidewave.md)\n- [Prompt Injection] (LOW): The skill provides instructions forCLAUDE.mdthat guide the AI to use these high-privilege tools, potentially bypassing safety context. (File: references/tidewave.md)\n- [Indirect Prompt Injection] (LOW): The skill is vulnerable to indirect injection if the AI processes malicious content from logs or database records. Evidence: 1. Ingestion points:get_logs,execute_sql_query. 2. Boundary markers: Absent. 3. Capability inventory:project_eval. 4. Sanitization: Absent. (File: references/tidewave.md)
Audit Metadata