haloy-config

Pass

Audited by Gen Agent Trust Hub on Mar 17, 2026

Risk Level: SAFEEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [REMOTE_CODE_EXECUTION]: The skill suggests an installation method for the Haloy CLI using the command curl -fsSL https://sh.haloy.dev/install-haloy.sh | sh. This script is hosted on the developer's official domain.
  • [EXTERNAL_DOWNLOADS]: Points users to download the CLI tool and configuration resources from vendor-controlled domains including haloy.dev and sh.haloy.dev.
  • [COMMAND_EXECUTION]: Describes the use of pre_deploy and post_deploy hooks in the haloy.yaml configuration, which are intended for running local automation tasks during the deployment process.
  • [PROMPT_INJECTION]: The skill possesses an indirect prompt injection surface through its analysis of untrusted project data.
  • Ingestion points: Processes contents from files such as package.json, pyproject.toml, go.mod, Cargo.toml, and prisma/schema.prisma (SKILL.md).
  • Boundary markers: Absent; the skill does not define specific delimiters to wrap or ignore instructions embedded within the processed files.
  • Capability inventory: Writes haloy.yaml and suggests CLI commands like haloy deploy (SKILL.md).
  • Sanitization: Absent; no evidence of data sanitization or escaping of file content prior to processing.
  • [SAFE]: The skill reads existing server settings from ~/.config/haloy/client.yaml to assist the user, which is a legitimate operation for a deployment utility.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 17, 2026, 03:14 PM