systematic-debugging
Pass
Audited by Gen Agent Trust Hub on Apr 12, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill includes a bash utility
find-polluter.shthat identifies and executes local test files usingnpm testto find state pollution. - [COMMAND_EXECUTION]: The methodology provides examples of using system diagnostic tools such as
security list-keychainsandenvto verify environment and configuration state. - [DYNAMIC_EXECUTION]: The
find-polluter.shscript uses user-supplied patterns to identify and execute code, which requires trust in the input source. - [INDIRECT_PROMPT_INJECTION]: The skill processes external data including error messages and stack traces as part of the debugging workflow.
- Ingestion points:
SKILL.md(Phase 1, Step 1: Read Error Messages). - Boundary markers: None mentioned for external log or error content.
- Capability inventory: The skill provides instructions for writing code, executing tests, and running system commands.
- Sanitization: No explicit validation or filtering of log content is defined in the process.
Audit Metadata