workbench-cli
Warn
Audited by Gen Agent Trust Hub on Mar 19, 2026
Risk Level: MEDIUMCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The skill provides example workflows that access sensitive local file paths containing credentials.\n
- Evidence: In
examples/workflows/claude-profile-triage.yaml, theharness.auth.pathis set to/Users/alice/.config/claude-workflow-profileto retrieve authentication data.\n- [EXTERNAL_DOWNLOADS]: The skill facilitates the installation of external packages and dependencies at runtime.\n - Evidence: The
codex-review-loop.yamlexample includes abefore_runhook that executesnpm install. Additionally,references/commands.mdprovides instructions for installing the vendor's CLI vianpm install -g @workbench-ai/workbenchandnpx.\n- [COMMAND_EXECUTION]: The workflow engine is designed to execute arbitrary shell commands across various lifecycle hooks and actions.\n - Evidence: Files like
examples/workflows/codex-review-loop.yamlandexamples/workflows/webhook-claude-gated.yamlcontain shell scripts inhooks,gate, andactionsblocks (e.g.,npm test,git clone,./scripts/request-changes.sh).\n- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection due to the way it handles untrusted external data.\n - Ingestion points: Data enters the system via
triggers.webhook(incodex-review-loop.yamlandwebhook-claude-gated.yaml) andtriggers.manual(ininteractive-conversation.yaml).\n - Boundary markers: No explicit boundary markers or instructions to ignore embedded instructions are present in the provided templates.\n
- Capability inventory: The system can execute shell commands via hooks/actions and provides the AI harness with tools like
Bash,Edit,Read, andWrite(as seen inclaude-profile-triage.yaml).\n - Sanitization: There is no evidence of sanitization or escaping for the interpolated payload data (e.g.,
{{ trigger.payload.message }}).
Audit Metadata