portlang
Pass
Audited by Gen Agent Trust Hub on Mar 24, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The framework allows the execution of arbitrary shell commands through the built-in
bashtool, custom shell tools, and shell verifiers within a containerized workspace. - [EXTERNAL_DOWNLOADS]: The skill facilitates downloading the
portlangCLI tool from the vendor's official Homebrew tap and usesnpxto fetch MCP servers from well-known organizations like @modelcontextprotocol. - [REMOTE_CODE_EXECUTION]: Custom Python tools can define third-party dependencies using PEP 723 metadata, which are automatically installed from official registries at runtime using the
uvtool. - [PROMPT_INJECTION]: The skill presents an indirect prompt injection surface as it processes untrusted data from tool outputs and files that are interpolated into agent prompts.
- Ingestion points: Data provided via the
--inputflag, file contents in the workspace, and results from external tool calls are processed by the agent. - Boundary markers: The framework provides robust boundary controls, including file-system write patterns (
allow_write), network access toggles, and token/cost ceilings. - Capability inventory: Includes shell access, file-system manipulation, and the ability to run arbitrary Python code with dependencies.
- Sanitization: Relies on defined boundaries and the agent's internal logic; does not specify automated sanitization for external content interpolated into prompts.
Audit Metadata