copaw-ops
Warn
Audited by Gen Agent Trust Hub on Mar 19, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTIONCREDENTIALS_UNSAFE
Full Analysis
- [COMMAND_EXECUTION]: The skill uses administrative commands such as 'sudo systemctl restart copaw', 'docker restart', and 'supervisorctl restart app' to manage services.
- [COMMAND_EXECUTION]: Includes destructive operations such as 'rm -rf ~/.copaw/memory/' for clearing memory and 'copaw init --force' for reinitializing the environment.
- [PROMPT_INJECTION]: The skill has an attack surface for indirect prompt injection. Ingestion points: User reports of service failures (SKILL.md). Boundary markers: Absent. Capability inventory: Service restarts (sudo systemctl), container management (docker), and file deletion (rm -rf) (references/copaw_recovery.md). Sanitization: Absent.
- [CREDENTIALS_UNSAFE]: Includes functionality to list and modify environment variables ('copaw env list', 'copaw env set'), which may expose or manage sensitive service credentials.
Audit Metadata