terraform-module-creator
Warn
Audited by Gen Agent Trust Hub on Apr 9, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill instructs the agent to utilize and publish infrastructure modules within a specific external GitHub organization and Terraform Registry namespace (
c0x12c). - Evidence: The instructions in
SKILL.mdexplicitly point tohttps://registry.terraform.io/namespaces/c0x12candhttps://github.com/c0x12c/for module distribution and consumption. - Risk: This source is not a recognized trusted vendor nor is it associated with the skill's author (
spartan-stratos). Using unverified third-party modules can lead to the deployment of malicious or insecure infrastructure configurations. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection (Category 8) due to its handling of untrusted input during code generation.
- Ingestion points: The skill prompts the user for the
Module name,Resources managed, andConsumersat the start of the process (Step 1 inSKILL.md). - Boundary markers: No boundary markers or 'ignore' instructions are used to separate user-provided metadata from the code generation templates.
- Capability inventory: The agent uses
WriteandEdittools to create.tffiles based on the provided inputs. - Sanitization: There is no evidence of sanitization or validation performed on the user-provided strings before they are interpolated into the generated HCL code (e.g., in resource names, descriptions, or tags).
Audit Metadata