flow-next-interview
Pass
Audited by Gen Agent Trust Hub on May 13, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill directs the agent to execute a bundled utility,
flowctl, found within the plugin's own directory. It correctly resolves the executable's path using platform environment variables likeDROID_PLUGIN_ROOTorCLAUDE_PLUGIN_ROOT, which ensures the tool is executed from a trusted, local source. - [COMMAND_EXECUTION]: Argument parsing logic in the skill uses shell utilities such as
jq,sed, andtrwith safe practices. Specifically, it employsprintf "%s"to handle raw user input from$ARGUMENTS, preventing common shell-based injection vulnerabilities. - [PROMPT_INJECTION]: The skill uses predefined regex patterns (e.g.,
fn-\d+) to identify and validate Flow IDs provided by the user. This validation layer ensures that only identifiers matching the expected format are processed by the underlying tools. - [PROMPT_INJECTION]: The skill ingests untrusted data from
$ARGUMENTS, file paths, and output fromflowctlcommands (which read project files). While no explicit boundary markers are used for this data, its capabilities are restricted to project-scoped file operations viaflowctland basic shell utilities. Sanitization is primarily performed via regex validation for identifiers.
Audit Metadata