loom-security-scan

Pass

Audited by Gen Agent Trust Hub on May 9, 2026

Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill uses the Bash tool to execute various security scanners and regex-based searches. This is the core functionality of the skill for detecting hardcoded secrets and configuration issues.\n- [EXTERNAL_DOWNLOADS]: The documentation suggests installing numerous security utilities via standard package managers (Homebrew, npm, pip, go, cargo) and references official GitHub Actions. These tools, such as TruffleHog, Trivy, and Semgrep, are widely recognized and come from well-known technology providers.\n- [PROMPT_INJECTION]: The skill creates an attack surface for indirect prompt injection by instructing the agent to scan and process the contents of local files which could contain malicious text.\n
  • Ingestion points: Local project files (source code, configuration, environment files) are ingested via tools like grep, semgrep, and dependency auditors.\n
  • Boundary markers: The instructions do not define specific delimiters or instructions to ignore embedded commands when processing the output of these tools.\n
  • Capability inventory: The skill enables the use of Bash, Read, Grep, and Glob tools, which can be used to execute commands or read sensitive files.\n
  • Sanitization: There is no mention of sanitizing or escaping the content read from files before it is processed by the agent.
Audit Metadata
Risk Level
SAFE
Analyzed
May 9, 2026, 04:18 AM