systematic-debugging
Pass
Audited by Gen Agent Trust Hub on Apr 16, 2026
Risk Level: SAFE
Full Analysis
- [COMMAND_EXECUTION]: The skill includes a bash script
find-polluter.shwhich executesnpm teston local files to identify which test causes state pollution. This is a standard debugging utility. - [DATA_EXPOSURE]: The instructions in
SKILL.mdprovide examples of diagnostic instrumentation, such as checking environment variables and keychain identities (security list-keychains). While these are presented as examples for debugging signing or configuration issues, they demonstrate how the agent might access sensitive metadata during a troubleshooting session. - [INDIRECT_PROMPT_INJECTION]: The skill is designed to ingest and analyze potentially untrusted external data, such as stack traces, build logs, and error messages from the environment. This creates a surface for indirect prompt injection where malicious instructions could be embedded in logs or code being debugged.
- Ingestion points: Error messages, stack traces, and log files analyzed during Phase 1 (Root Cause Investigation).
- Boundary markers: None explicitly defined for isolating untrusted log data.
- Capability inventory: File system access, shell command execution (
npm,find,security), and the ability to write diagnostic code. - Sanitization: The skill does not prescribe specific sanitization for data extracted from error logs before analysis.
Audit Metadata