code-documenter
Warn
Audited by Gen Agent Trust Hub on Mar 24, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill's core workflow instructs the agent to execute code snippets contained within documentation blocks using
python -m doctestandpytest --doctest-modules. This constitutes a command execution surface where the agent runs code extracted from potentially untrusted source files as part of the validation process. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection as it ingests and processes untrusted source code and comments.
- Ingestion points: The agent reads and processes source code files (Python, JavaScript, TypeScript), OpenAPI specifications, and README files from the project directory.
- Boundary markers: No specific delimiters or instructions are provided to the agent to distinguish between its own operational instructions and content found within the analyzed code files or comments.
- Capability inventory: The agent has the ability to execute shell commands and run code validation tools such as
doctest,pytest,tsc, andnpxon the local file system. - Sanitization: No procedures are defined to sanitize or validate the content of code examples before execution, allowing instructions embedded in code comments to potentially influence agent behavior.
- [EXTERNAL_DOWNLOADS]: The skill documentation provides instructions for installing and using several standard developer tools and libraries from public registries, including
pydocstyle,interrogate,@redocly/cli, anddocusaurus. These are recognized industry-standard packages used for documentation and linting.
Audit Metadata