haproxy
Pass
Audited by Gen Agent Trust Hub on Mar 18, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes
sudofor administrative actions including service reloads viasystemctl, configuration validation, and interaction with the HAProxy runtime API socket usingsocat. These are standard operations for the intended task. - [COMMAND_EXECUTION]: Instructions are provided for creating SSL certificate bundles and managing file permissions for sensitive PEM files.
- [EXTERNAL_DOWNLOADS]: The skill references official documentation and resources from
haproxy.organdmozilla.org. Both are recognized as trusted or well-known services. - [PROMPT_INJECTION]: The skill provides an attack surface for indirect prompt injection as it ingests untrusted configuration data.
- Ingestion points: Processes files matching
**/haproxy.cfgand other configuration patterns in theSKILL.mdglobs. - Boundary markers: The skill does not implement specific delimiters or warnings to ignore instructions embedded within configuration files.
- Capability inventory: The skill can execute privileged shell commands, modify service states, and manipulate load balancer server configurations.
- Sanitization: Recommended use of
haproxy -cfor syntax validation acts as a partial integrity check, but does not sanitize against instruction injection.
Audit Metadata