interop-router
Pass
Audited by Gen Agent Trust Hub on Mar 25, 2026
Risk Level: SAFEDATA_EXFILTRATIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [DATA_EXFILTRATION]: The skill is architected to aggregate local file content and git diffs into a unified context file for submission to external AI providers (OpenAI and Google).
- Evidence:
scripts/wrap_context.pycollects data from the project directory to prepare prompts for external CLIs. - Mitigation: The implementation includes a
SECRET_PATTERNSlist for redaction and aSKIP_FILESlist to prevent the inclusion of sensitive configuration files. - [COMMAND_EXECUTION]: The skill utilizes local shell and system commands to perform project analysis and environment checks.
- Evidence:
scripts/check_cli_available.shexecutescodexandgeminicommands to verify installation and authentication status. - Evidence:
scripts/wrap_context.pyusessubprocess.runto executegit diffcommands. - [PROMPT_INJECTION]: The skill presents an indirect prompt injection surface by ingesting and processing untrusted data from the local filesystem.
- Ingestion Points:
scripts/wrap_context.pyreads arbitrary files within the project scope as directed by the task. - Boundary Markers: Uses markdown headers and code blocks; however, there are no explicit instructions in the generated context for the external AI to ignore instructions embedded within the files.
- Capability Inventory: The skill facilitates code reading and preparation for external model execution, which could be influenced by malicious content in project files.
- Sanitization: While the skill redacts technical secrets, it does not sanitize or filter natural language instructions contained within the gathered source code or documentation.
Audit Metadata