tailing-build-output
Pass
Audited by Gen Agent Trust Hub on Apr 12, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: Uses the
headcommand to read terminal output files and monitor build progress across various engines like Docker, Webpack, and Turbo. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it reads and acts upon untrusted data from build logs. An attacker who can influence build output (e.g., through a malicious dependency or error message) could potentially trick the agent into making unauthorized code changes.
- Ingestion points: Reads from log files located in
<terminals_folder>/*.txtas defined in SKILL.md. - Boundary markers: No specific delimiters or markers are defined to separate log content from agent instructions.
- Capability inventory: The skill workflow explicitly includes reading and writing source files to resolve build errors.
- Sanitization: There is no evidence of sanitization or validation of log content before the agent uses it to modify files.
Audit Metadata