oma-docs
Pass
Audited by Gen Agent Trust Hub on May 9, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Utilizes system commands such as
git diffto identify code changes andgit applyto update documentation. File modifications are restricted to an interactive mode requiring explicit user approval for each change. - [EXTERNAL_DOWNLOADS]: Recommends the use of
lychee, a well-known open-source tool for checking URL links, which can be installed from its official GitHub repository. - [PROMPT_INJECTION]: Processes external content from Markdown files and code diffs which presents a surface for indirect prompt injection. This is mitigated by the interactive review process and the exclusion of sensitive files (e.g., .env, .pem, .key) from the analysis context.
- Ingestion points: Reads docs/**/*.md and git diff output.
- Boundary markers: Supports to skip regions.
- Capability inventory: Can perform file writes via git apply and network HEAD requests via lychee.
- Sanitization: Automatically redacts secrets and excludes gitignored files.
Audit Metadata