generate-openenv-env
Pass
Audited by Gen Agent Trust Hub on Mar 27, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The
Dockerfiletemplate inassets/openenv_env_template/server/Dockerfileis configured to download theuvpackage manager installer from its official domain,astral.sh, which is a well-known service. - [COMMAND_EXECUTION]: The skill workflow involves executing several shell commands to initialize environments, build container images, and run validation tests (e.g.,
uv run,docker build,uvicorn, andcurl). These commands are standard for development workflows and essential to the skill's primary purpose. - [REMOTE_CODE_EXECUTION]: The provided
Dockerfiletemplate utilizes thecurl | shpattern to install theuvtool. While this pattern carries inherent risk, the source is a recognized and well-known developer tool service. - [DYNAMIC_EXECUTION]: The skill performs automated code generation (scaffolding) of Python scripts and configuration files, which are then executed during the environment validation and smoke-testing phase. This is the intended core behavior for a development scaffolding tool.
- [INDIRECT_PROMPT_INJECTION]: The skill includes a research workflow that ingests data from external library documentation and repositories to guide the scaffolding process. This represents a potential attack surface for indirect prompt injection if an attacker controls the researched documentation, but the risk is managed by the skill's instructions to extract only implementation-critical details.
Audit Metadata