operon-fs-jobs
Pass
Audited by Gen Agent Trust Hub on May 3, 2026
Risk Level: SAFECOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill is built around the
operonCLI, directing the agent to use commands likeoperon fs write,operon fs rm, andoperon mount. These commands allow for significant modification of the target environment, though the instructions include safety checks requiring the agent to confirm before performing destructive actions. - [REMOTE_CODE_EXECUTION]: The
operon job runfunctionality allows the agent to execute arbitrary shell commands on remote nodes. This is an intended feature of the skill but represents a high-impact capability that must be handled with caution. - [PROMPT_INJECTION]: The skill facilitates indirect prompt injection by reading external data from remote nodes, which could contain malicious instructions designed to override agent behavior.
- Ingestion points: Remote file content (via
operon fs read) and job output/logs (viaoperon job logs). - Boundary markers: The instructions lack explicit boundary markers or warnings to the agent to disregard instructions found within the remote files or logs.
- Capability inventory: The agent has access to powerful tools including file system modification (
fs write,fs copy,fs rm), mounting capabilities (operon mount), and process execution (job run). - Sanitization: No sanitization or validation logic is provided for the data retrieved from remote nodes.
Audit Metadata