systematic-debugging

Pass

Audited by Gen Agent Trust Hub on Apr 12, 2026

Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill includes a bash utility find-polluter.sh that identifies and executes local test files using npm test to find state pollution.
  • [COMMAND_EXECUTION]: The methodology provides examples of using system diagnostic tools such as security list-keychains and env to verify environment and configuration state.
  • [DYNAMIC_EXECUTION]: The find-polluter.sh script uses user-supplied patterns to identify and execute code, which requires trust in the input source.
  • [INDIRECT_PROMPT_INJECTION]: The skill processes external data including error messages and stack traces as part of the debugging workflow.
  • Ingestion points: SKILL.md (Phase 1, Step 1: Read Error Messages).
  • Boundary markers: None mentioned for external log or error content.
  • Capability inventory: The skill provides instructions for writing code, executing tests, and running system commands.
  • Sanitization: No explicit validation or filtering of log content is defined in the process.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 12, 2026, 02:59 AM