peach-setup-ui-proto
Pass
Audited by Gen Agent Trust Hub on May 12, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes local shell commands such as
ls,cat, andgrepto inspect the current project directory, detect the structure, and read existing configuration files. - [COMMAND_EXECUTION]: As part of its documented cleanup process, the skill executes file and directory deletions for legacy configuration files, specifically
rm -rf .cursor/rules/andrm .cursorrules. - [PROMPT_INJECTION]: The skill identifies an indirect prompt injection surface by ingesting content from untrusted local files.
- Ingestion points: Reads existing
CLAUDE.mdandAGENTS.mdfiles usingcatin SKILL.md (Step 1). - Boundary markers: None are present; the skill reads file contents directly into the agent's context without delimiters or instructions to disregard embedded commands.
- Capability inventory: The skill is capable of modifying and creating files (
CLAUDE.md,AGENTS.md) and deleting directories (rm -rf). - Sanitization: No sanitization or validation of the content from the ingested files is performed before it is used to determine the setup logic.
Audit Metadata