laravel-update-with-rector
Warn
Audited by Gen Agent Trust Hub on Mar 19, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill directs the agent to run various command-line tools including
composerfor dependency management,php artisanfor cache and configuration management, and therectorbinary for code processing. These commands modify the local system state and project environment. - [EXTERNAL_DOWNLOADS]: To perform the upgrade, the skill requires downloading external PHP packages
rector/rectoranddriftingly/rector-laravelfrom public repositories. These tools are not pre-installed in the agent environment and are fetched at runtime. - [REMOTE_CODE_EXECUTION]: By installing and executing the Rector tool and its associated rulesets, the agent is running third-party code within the user's project context. Additionally, the skill involves configuring a
rector.phpfile (a PHP script) which is subsequently executed to apply code transformations. - [PROMPT_INJECTION]: The skill processes untrusted project data which creates a surface for indirect prompt injection.
- Ingestion points: Local project files such as
composer.json,composer.lock, andrector.phpare read to analyze the current project state. - Boundary markers: There are no explicit delimiters or instructions to the agent to ignore potentially malicious embedded instructions when reading these files.
- Capability inventory: The agent possesses capabilities to execute shell commands, modify project files, and run the project's test suite via
composer test. - Sanitization: The skill does not implement validation or sanitization of the content within project files before using that data to drive the automated refactoring process.
Audit Metadata