kwc-project-scaffold
Pass
Audited by Gen Agent Trust Hub on Apr 29, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill facilitates project scaffolding and deployment by executing the '@kdcloudjs/cli' (kd) and local utility scripts for menu management and metadata queries. \n- [DATA_EXFILTRATION]: Scripts such as
_shared.mjsand its dependants access proprietary configuration and secret files located in the user's home directory at~/.kd/config.jsonand~/.kd/secret.key. This data is used to authenticate requests to environment-specific URLs. \n- [CREDENTIALS_UNSAFE]: The skill manages authentication tokens and secrets. The_shared.mjsscript contains logic to decryptclient_secretandaccess_tokenvalues using a local AES-256-CBC key. While these are used for official platform interactions, they involve handling raw credentials in memory. \n- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection (Category 8) because it ingests and processes untrusted data from local metadata files (.page-meta.kwp,.js-meta.kwc,.kws) and remote API responses (e.g., menu trees, entity field structures). \n * Ingestion points: XML metadata file reading inform-link.mjsand JSON API responses inmenu-api.mjsandmeta-query-api.mjs. \n * Boundary markers: No explicit delimiters or instructions are used to separate ingested data from agent instructions during processing. \n * Capability inventory: File system read/write, network fetch operations, and local command execution. \n * Sanitization: The skill performs minimal sanitization, primarily relying on standard JSON and XML parsing.
Audit Metadata