clean-code-reviewer
Pass
Audited by Gen Agent Trust Hub on Apr 6, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/pre-review.pyexecutes therufflinter usingsubprocess.runto provide automated feedback. - Evidence: Line 102 in
scripts/pre-review.pyinvokessubprocess.run(["ruff", "check", ...]). - Context: The execution is restricted to the linter tool and uses list-based arguments to prevent shell injection. This is a standard utility for code analysis.
- [PROMPT_INJECTION]: The skill processes user-provided source code, which represents an indirect prompt injection surface.
- Ingestion points: User-provided code snippets are read by
scripts/pre-review.pyand processed by the agent inSKILL.md. - Boundary markers: The agent is instructed to focus on 'Clean Code' principles and structure reviews into specific steps.
- Capability inventory: The skill can read local files and execute the
rufflinter; it does not have network access or general command execution capabilities. - Sanitization: Input code is parsed using Python's
astmodule, which performs safe static analysis without execution.
Audit Metadata