desktop
Pass
Audited by Gen Agent Trust Hub on Feb 22, 2026
Risk Level: SAFEPROMPT_INJECTION
Full Analysis
- Indirect Prompt Injection (LOW): The implementation guide for 'local tools' in 'references/local-tools.md' describes a capability that allows file renaming. The provided code snippet is vulnerable to path traversal because it does not sanitize input parameters.
- Ingestion points: 'oldPath' and 'newName' parameters in 'LocalFileCtr.ts'.
- Boundary markers: No delimiters or safety warnings are included in the template.
- Capability inventory: 'fs.rename' call in 'apps/desktop/src/main/controllers/LocalFileCtr.ts' provides file system write access.
- Sanitization: Absent; the example directly uses 'path.join' on raw input parameters.
Audit Metadata