gpc-security
Pass
Audited by Gen Agent Trust Hub on Apr 26, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The detection script
scripts/detect_gpc.mjsusesexecSyncto rungpcandnpxcommands. These commands use hardcoded strings to verify installation, authentication status, and configuration. While this is dynamic execution, the inputs are static and the purpose is restricted to environment detection. - [COMMAND_EXECUTION]: The skill instructions and
references/key-rotation.mdprovide procedures involving file system operations such asrm -rf ~/.cache/gpc/tokens/,rm -P, andshred. These are intended for clearing sensitive caches and securely deleting old service account keys as part of the primary skill purpose. - [INDIRECT_PROMPT_INJECTION]: The skill processes external data that could be influenced by an attacker, specifically the GPC audit log at
~/.config/gpc/audit.log. - Ingestion points: The audit log is read using
tailorcatas described inSKILL.md. - Boundary markers: None are present in the provided instructions; data is piped directly into
jqfor display. - Capability inventory: The skill environment includes shell execution capabilities via
detect_gpc.mjsand file manipulation commands in the procedure documentation. - Sanitization: No sanitization or escaping of the audit log content is described before it is processed by the agent.
Audit Metadata