skills/chujianyun/skills/copaw-ops/Gen Agent Trust Hub

copaw-ops

Warn

Audited by Gen Agent Trust Hub on Mar 19, 2026

Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTIONCREDENTIALS_UNSAFE
Full Analysis
  • [COMMAND_EXECUTION]: The skill uses administrative commands such as 'sudo systemctl restart copaw', 'docker restart', and 'supervisorctl restart app' to manage services.
  • [COMMAND_EXECUTION]: Includes destructive operations such as 'rm -rf ~/.copaw/memory/' for clearing memory and 'copaw init --force' for reinitializing the environment.
  • [PROMPT_INJECTION]: The skill has an attack surface for indirect prompt injection. Ingestion points: User reports of service failures (SKILL.md). Boundary markers: Absent. Capability inventory: Service restarts (sudo systemctl), container management (docker), and file deletion (rm -rf) (references/copaw_recovery.md). Sanitization: Absent.
  • [CREDENTIALS_UNSAFE]: Includes functionality to list and modify environment variables ('copaw env list', 'copaw env set'), which may expose or manage sensitive service credentials.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 19, 2026, 04:17 PM