env-and-assets-bootstrap
Warn
Audited by Gen Agent Trust Hub on May 10, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/bootstrap_env.pyusessubprocess.runto execute environment management commands includingconda,mamba, andpip. This allows the execution of system-level tools to modify the environment. - [REMOTE_CODE_EXECUTION]: The skill facilitates the execution of third-party code located within a user-provided target repository. Specifically, if a
setup.pyfile is detected, the skill executespip install -e ., which runs the arbitrary Python code contained within thesetup.pyfile under the current user's privileges. - [PROMPT_INJECTION]: The skill exhibits a surface for indirect prompt injection by parsing untrusted documentation and configuration files to determine its setup plan.
- Ingestion points:
scripts/plan_setup.pyandscripts/prepare_assets.pyread local repository files such asREADME.md,environment.yml, and various configuration files. - Boundary markers: The skill lacks explicit boundary markers or instructions to the agent to ignore potentially malicious directions embedded in the repository's documentation.
- Capability inventory:
scripts/bootstrap_env.pyprovides the capability to execute shell commands and install packages based on the parsed data. - Sanitization: No validation of file contents is performed before processing.
Audit Metadata