tailing-build-output

Pass

Audited by Gen Agent Trust Hub on Apr 12, 2026

Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
  • [COMMAND_EXECUTION]: Uses the head command to read terminal output files and monitor build progress across various engines like Docker, Webpack, and Turbo.
  • [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it reads and acts upon untrusted data from build logs. An attacker who can influence build output (e.g., through a malicious dependency or error message) could potentially trick the agent into making unauthorized code changes.
  • Ingestion points: Reads from log files located in <terminals_folder>/*.txt as defined in SKILL.md.
  • Boundary markers: No specific delimiters or markers are defined to separate log content from agent instructions.
  • Capability inventory: The skill workflow explicitly includes reading and writing source files to resolve build errors.
  • Sanitization: There is no evidence of sanitization or validation of log content before the agent uses it to modify files.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 12, 2026, 09:43 PM