jfrog-provision-project
Pass
Audited by Gen Agent Trust Hub on Apr 29, 2026
Risk Level: SAFECOMMAND_EXECUTIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes the
jfCLI andcurlas a fallback to interact with the JFrog Platform's REST API. This is expected behavior for a provisioning tool. - [CREDENTIALS_UNSAFE]: Accesses
.envfiles to loadJFROG_ACCESS_TOKENandJFROG_URL. This is documented as a standard and safe practice for local environment configuration and credential management. - [PROMPT_INJECTION]: The skill processes user-supplied inputs (
display_name,description) that are interpolated into a shell command and JSON payload, which represents a potential surface for indirect injection. - Ingestion points: User-provided inputs defined in SKILL.md.
- Boundary markers: Absent in the shell script implementation.
- Capability inventory:
jfandcurlexecution for network operations;sourcecommand for environment modification. - Sanitization: The
PROJECT_KEYis strictly validated against a regex (^[a-z][a-z0-9]{2,31}$), but other metadata fields are used without explicit sanitization.
Audit Metadata