verifying-taubyte-functions
Warn
Audited by Gen Agent Trust Hub on May 3, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill instructs the user to use
sudoto append entries to the/etc/hostsfile. This is a privilege escalation pattern used to enable local domain resolution for browser-based testing. - [COMMAND_EXECUTION]: Executes complex
docker runcommands to compile Go source code to WASM. This involves mounting host directories as read-only and executing shell scripts within a containerized environment. - [EXTERNAL_DOWNLOADS]: Pulls the
taubyte/go-wasi:latestDocker image to provide the build runtime. This is a vendor-owned resource used for the skill's primary function. - [COMMAND_EXECUTION]: The skill exhibits an indirect prompt injection surface by parsing local configuration files and using the output in shell commands.
- Ingestion points: Extracts FQDN values from
config/domains/<domain>.yaml(SKILL.md). - Boundary markers: Absent; data is interpolated directly into command strings.
- Capability inventory: Utilizes
sudo,curl, anddockerwith variables derived from the configuration (SKILL.md). - Sanitization: No validation or escaping is performed on the parsed configuration values before shell execution.
Audit Metadata