toolchain-commands
Fail
Audited by Gen Agent Trust Hub on May 13, 2026
Risk Level: HIGHCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses
sudoto start the Docker daemon (sudo dockerd) and manage infrastructure containers (sudo docker compose up). Running commands with root privileges grants the agent administrative control over the host system. - [COMMAND_EXECUTION]: It invokes numerous project-specific scripts through
pnpm(e.g.,pnpm dev,pnpm build,pnpm test). These commands execute arbitrary shell scripts defined within the repository'spackage.jsonfile. - [COMMAND_EXECUTION]: The skill configures local git hooks using
pnpm hooks. This modifies the.git/hooksdirectory, allowing for automatic script execution during standard git operations (like committing). - [COMMAND_EXECUTION]: It executes custom or non-standard binaries such as
tsgo(described as a native preview for TypeScript) andtsdown. These tools may have unverified behaviors compared to official toolchains. - [INDIRECT_PROMPT_INJECTION]: The skill ingests data from environment configuration files and repository scripts, creating an attack surface where maliciously crafted files could influence agent behavior.
- Ingestion points: Reads
.env.development,.env.test, andpackage.jsonscripts. - Boundary markers: Absent; there are no delimiters or warnings to ignore instructions embedded in these files.
- Capability inventory: Includes shell execution,
sudoaccess, Docker service management, and network health checks (curl). - Sanitization: None; the skill does not validate or escape the contents of the environment files or scripts before execution.
Recommendations
- AI detected serious security threats
Audit Metadata