env-manager
Warn
Audited by Gen Agent Trust Hub on Apr 28, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTIONREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses
shell_execinSKILL.mdto run thescripts/env.pyscript for setting, unsetting, and listing environment variables. - [DATA_EXFILTRATION]: The script
scripts/env.pyidentifies and interacts with sensitive configuration files (specifically.envfiles viaget_magic_env_file()). While the script implements amask()function to hide credentials in thelistcommand output, it maintains full read/write access to these files. - [REMOTE_CODE_EXECUTION]: In
scripts/env.py, the_setup_project_rootand_init_path_managerfunctions perform dynamic path resolution by searching the directory tree for markers likesetup.py. It then modifiessys.pathat runtime to import internal modules (e.g.,app.path_manager), which is a form of dynamic loading from computed paths. - [PROMPT_INJECTION]: The skill presents an indirect prompt injection surface as it ingests untrusted data (keys and values) from the agent's context and persists them to the filesystem.
- Ingestion points: The script accepts arguments via
sys.argvinmain()which are then passed tocmd_setandcmd_unset. - Boundary markers: No boundary markers or instructions to ignore embedded commands are present in the prompt templates.
- Capability inventory: The script uses the
python-dotenvlibrary to write directly to.envfiles on the filesystem. - Sanitization: While keys are validated against a regex (
^[A-Za-z_][A-Za-z0-9_]*$), the values are passed to theset_keyfunction without explicit sanitization or validation within the script.
Audit Metadata