cache-strategy
Pass
Audited by Gen Agent Trust Hub on Apr 28, 2026
Risk Level: SAFECOMMAND_EXECUTIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses
grepandbashcommands to perform discovery within the project's filesystem, scanning for Redis, Memcached, and database query patterns. - [CREDENTIALS_UNSAFE]: The discovery step specifically instructs the agent to grep for strings like
REDIS_URLandMEMCACHEwithin environment files (e.g.,.env,.env*) and configuration files. These variables often contain embedded passwords or tokens which would be exposed to the agent's context during discovery. - [INDIRECT_PROMPT_INJECTION]: The skill has an attack surface for indirect prompt injection due to its automated scanning and processing of untrusted local data.
- Ingestion points: The skill reads various file types (
.js,.py,.rb,.json,.yml,.env) throughout the repository usinggrep,Glob, andReadtools. - Boundary markers: The instructions do not define boundary markers or delimiters for the data being read.
- Capability inventory: The agent has access to
Bash,Write, andEdittools, allowing it to execute commands or modify files based on instructions interpreted from the scanned data. - Sanitization: No sanitization or validation of the ingested code/configuration content is mentioned.
Audit Metadata