evolve-cli
Pass
Audited by Gen Agent Trust Hub on Mar 30, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill is designed to execute arbitrary shell commands defined in the workspace's
.evolve/config.yamlfile for the agent and evaluator components. Evidence: Configuration examples show usage such asrun: python3 ./evaluate.pyandcommand: node. - [EXTERNAL_DOWNLOADS]: The
gepastrategy utilizes theuvpackage manager to fetch and execute specific versions of Python packages, includinggepa==0.1.1andlitellm==1.82.6, at runtime. - [PROMPT_INJECTION]: The skill presents an indirect prompt injection surface due to its core functionality of ingesting and analyzing workspace data to generate new code proposals. 1. Ingestion points: Workspace files (e.g.,
packing.py) and historical records stored in the.evolve/runtime/directory. 2. Boundary markers: The documentation does not specify the use of strict boundary markers or instructions to ignore instructions embedded within the processed data. 3. Capability inventory: The skill can execute shell commands via theevolve runandevolve validatecommands and performs file system modifications. 4. Sanitization: No explicit sanitization or validation of the ingested content is documented.
Audit Metadata