nextjs-debug
Warn
Audited by Gen Agent Trust Hub on Mar 5, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill is designed to run several system-level commands to gather environment and project data.
- Evidence: SKILL.md specifies running
node -v,git log --oneline,git status --porcelain,git diff, andrg(ripgrep). - Evidence: reference.md includes templates for
npx tsc,lsof,kill -9, andrm -rf .next. - [CREDENTIALS_UNSAFE]: The skill explicitly accesses and searches files that typically contain sensitive information.
- Evidence: reference.md contains instructions to list
.env*files and search forprocess.envusage in client-side code. - Evidence: SKILL.md reads
package.jsonand version control metadata which may contain sensitive project structure details. - [PROMPT_INJECTION]: The skill exhibits an attack surface for indirect prompt injection (Category 8) due to its processing of untrusted external data.
- Ingestion points: Step 0 in SKILL.md accepts raw terminal logs and natural-language descriptions from the user.
- Boundary markers: There are no explicit delimiters or "ignore instructions" markers used when the agent processes the user-provided log content.
- Capability inventory: The skill has extensive capabilities including file system reading (cat/rg), file system modification (rm), process termination (kill), and command execution (node/npx/git).
- Sanitization: No sanitization or escaping is defined for identifiers (like FileRef or ModulePath) extracted from untrusted logs before they are interpolated into shell commands like
rg.
Audit Metadata