puda-machines
Pass
Audited by Gen Agent Trust Hub on Apr 16, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The agent is instructed to run
pudaCLI commands anduvpackage commands to explore machine capabilities and manage edge services. These commands interact with local system resources and hardware serial ports (e.g.,/dev/ttyUSB0) required for machine operation.\n- [PROMPT_INJECTION]: Theopentronsmachine reference describes reading data from external CSV files usingread_csv_file. This is an indirect prompt injection surface where untrusted input could influence generated protocols.\n - Ingestion points:
read_csv_fileandread_csvinreferences/opentrons-machine.md\n - Boundary markers: Missing explicit delimiters or instructions to ignore embedded commands in the CSV data\n
- Capability inventory: Includes shell execution and generation of runnable Python protocol code\n
- Sanitization: No explicit sanitization or validation of CSV content is defined.
Audit Metadata