devops-deployment
Pass
Audited by Gen Agent Trust Hub on Apr 11, 2026
Risk Level: SAFECREDENTIALS_UNSAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: Hardcoded default credentials are used in development templates.
- Evidence:
scripts/docker-compose.ymlcontainsPOSTGRES_PASSWORD: postgresandDATABASE_URL=postgresql://postgres:postgres@db:5432/app. - Note: While these are standard for local development environments, they represent a practice that can lead to credential leakage if adopted in production manifests.
- [COMMAND_EXECUTION]: The skill utilizes dynamic context injection to execute shell commands during skill processing.
- Evidence:
scripts/create-ci-pipeline.mdandscripts/create-docker-compose.mduse the!commandsyntax to rungrep,ls, andtestcommands for project metadata discovery. - Evidence:
SKILL.mdcontains an invocation hook:command -v docker >/dev/null 2>&1 || echo 'Warning...'which executes on skill load. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection by processing untrusted project data.
- Ingestion points:
scripts/create-ci-pipeline.mdandscripts/create-docker-compose.mdread content frompackage.json,pyproject.toml,Cargo.toml, and.envfiles using shell commands. - Boundary markers: Absent. Extracted data is directly interpolated into templates without delimiters or warnings to ignore embedded instructions.
- Capability inventory: The skill can write and modify
.github/workflows/*.ymlanddocker-compose.ymlfiles, which are executable in CI/CD and local environments. - Sanitization: No validation or sanitization is performed on the strings extracted from project files before they are used to generate workflow steps (e.g.,
${DETECTED_TEST_COMMAND}).
Audit Metadata