haloy-config
Pass
Audited by Gen Agent Trust Hub on Mar 17, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill suggests an installation method for the Haloy CLI using the command
curl -fsSL https://sh.haloy.dev/install-haloy.sh | sh. This script is hosted on the developer's official domain. - [EXTERNAL_DOWNLOADS]: Points users to download the CLI tool and configuration resources from vendor-controlled domains including
haloy.devandsh.haloy.dev. - [COMMAND_EXECUTION]: Describes the use of
pre_deployandpost_deployhooks in thehaloy.yamlconfiguration, which are intended for running local automation tasks during the deployment process. - [PROMPT_INJECTION]: The skill possesses an indirect prompt injection surface through its analysis of untrusted project data.
- Ingestion points: Processes contents from files such as
package.json,pyproject.toml,go.mod,Cargo.toml, andprisma/schema.prisma(SKILL.md). - Boundary markers: Absent; the skill does not define specific delimiters to wrap or ignore instructions embedded within the processed files.
- Capability inventory: Writes
haloy.yamland suggests CLI commands likehaloy deploy(SKILL.md). - Sanitization: Absent; no evidence of data sanitization or escaping of file content prior to processing.
- [SAFE]: The skill reads existing server settings from
~/.config/haloy/client.yamlto assist the user, which is a legitimate operation for a deployment utility.
Audit Metadata