verifying-taubyte-functions

Warn

Audited by Gen Agent Trust Hub on May 3, 2026

Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
  • [COMMAND_EXECUTION]: The skill instructs the user to use sudo to append entries to the /etc/hosts file. This is a privilege escalation pattern used to enable local domain resolution for browser-based testing.
  • [COMMAND_EXECUTION]: Executes complex docker run commands to compile Go source code to WASM. This involves mounting host directories as read-only and executing shell scripts within a containerized environment.
  • [EXTERNAL_DOWNLOADS]: Pulls the taubyte/go-wasi:latest Docker image to provide the build runtime. This is a vendor-owned resource used for the skill's primary function.
  • [COMMAND_EXECUTION]: The skill exhibits an indirect prompt injection surface by parsing local configuration files and using the output in shell commands.
  • Ingestion points: Extracts FQDN values from config/domains/<domain>.yaml (SKILL.md).
  • Boundary markers: Absent; data is interpolated directly into command strings.
  • Capability inventory: Utilizes sudo, curl, and docker with variables derived from the configuration (SKILL.md).
  • Sanitization: No validation or escaping is performed on the parsed configuration values before shell execution.
Audit Metadata
Risk Level
MEDIUM
Analyzed
May 3, 2026, 01:45 PM