laravel-devtoolbox-cli
Warn
Audited by Gen Agent Trust Hub on May 18, 2026
Risk Level: MEDIUMCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The command
php artisan dev:env:diffreads and compares environment files (e.g.,.env), which commonly contain sensitive information such as database credentials, application keys, and third-party API tokens.\n- [EXTERNAL_DOWNLOADS]: The installation process involves downloading thegrazulex/laravel-devtoolboxpackage from the external Composer repository (Packagist), which is not associated with the primary vendor or a recognized trusted organization.\n- [COMMAND_EXECUTION]: The skill is designed to run numerous shell commands via thephp artisanCLI. Documentation examples also demonstrate the use ofshell_execand automated scripts that perform network requests usingcurl.\n- [PROMPT_INJECTION]: This skill provides a surface for indirect prompt injection by reading application-specific data such as model definitions, route names, and SQL query traces that could be influenced by an attacker to include instructions for the agent.\n - Ingestion points: Application metadata retrieved by analysis commands in
SKILL.md.\n - Boundary markers: Absent; no delimiters or instructions are provided to the agent to distinguish between tool output and potential embedded instructions.\n
- Capability inventory: Extensive shell command execution (
php artisan), sensitive file system access, and network operations.\n - Sanitization: No sanitization or validation of the application data is performed before it is presented to the agent context.
Audit Metadata