gsp-runtime-compat
Pass
Audited by Gen Agent Trust Hub on Mar 23, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION]: The skill exhibits a vulnerability to indirect prompt injection because it retrieves and processes unstructured data from external websites to research runtime documentation.
- Ingestion points: Processes data from multiple documentation URLs using
WebFetchandWebSearchas defined in theSKILL.mdprocess. - Boundary markers: Lacks delimiters or instructions to ignore potential commands embedded in the fetched documentation content.
- Capability inventory: Accesses tools including
Bash,Read,Glob, andGrep, creating an execution surface if malicious instructions are ingested. - Sanitization: Fetched documentation is parsed and summarized without validation or sanitization of its content.
- [EXTERNAL_DOWNLOADS]: The skill fetches documentation from several well-known technology domains including Anthropic's Claude documentation, OpenCode, Gemini CLI, and OpenAI's Codex documentation to maintain format compatibility.
- [COMMAND_EXECUTION]: Employs
Bashto executegrepsearches within the project'sbin/install.jsfile. These commands are restricted to auditing specific function signatures within the local repository.
Audit Metadata