dist-build-migration
Pass
Audited by Gen Agent Trust Hub on May 8, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes shell commands to interact with the Nx CLI (
pnpm nx) and executes a local script (node ./scripts/copy-readme.js). While standard for development workflows, this involves the execution of code found within the repository. - [PROMPT_INJECTION]: The skill exhibits an attack surface for indirect prompt injection. It instructs the agent to read various configuration files (e.g.,
package.json,project.json,tsconfig.json) from the workspace and perform actions based on their contents. Maliciously crafted content within these files could potentially influence the agent's logic during the migration process. - Ingestion points: Files like
packages/<name>/package.json,project.json, and others are read into the agent's context. - Boundary markers: None are specified to separate file content from the agent's instructions.
- Capability inventory: The skill has access to
Write,Edit, andBashtools, allowing it to modify the filesystem and execute commands. - Sanitization: There is no mention of sanitizing or validating the contents of the files before processing them.
Audit Metadata