condition-based-waiting
Pass
Audited by Gen Agent Trust Hub on Apr 30, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The Bash implementations of
wait_forandretry_with_backoffinreferences/implementation-patterns.mduse theevalcommand to execute condition and command strings. This pattern is susceptible to command injection if the input strings are derived from untrusted sources. - [COMMAND_EXECUTION]: The Python function
check_commandinreferences/implementation-patterns.mdutilizessubprocess.run(command, shell=True). Usingshell=Trueis a security risk as it allows command injection if thecommandstring is constructed using unvalidated external input.
Audit Metadata