trae-cn
Pass
Audited by Gen Agent Trust Hub on Mar 4, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses
subprocess.runinscripts/trae.pyto launch the Trae IDE via theopencommand and to verify installations usingbrew. - [PROMPT_INJECTION]: The skill contains vulnerability surfaces for indirect prompt injection across its project creation and configuration tools.
- Ingestion points: Untrusted data enters the skill via command arguments like
--name,--prompt, and--commandinscripts/trae.py, as well as tool arguments inscripts/mcp_server.py. - Boundary markers: No delimiters or instructions are used to distinguish user input from the skill's own logic or templates.
- Capability inventory: The skill can perform directory creation (
os.makedirs), file writing (open().write()), and command execution (subprocess.run). - Sanitization: There is no validation or sanitization of user-provided strings before they are used to generate file paths, file contents, or IDE configuration files. Specifically,
configure_mcpallows the creation of configuration files in~/.trae/mcp/containing arbitrary execution commands.
Audit Metadata