oma-docs

Pass

Audited by Gen Agent Trust Hub on May 9, 2026

Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: Utilizes system commands such as git diff to identify code changes and git apply to update documentation. File modifications are restricted to an interactive mode requiring explicit user approval for each change.
  • [EXTERNAL_DOWNLOADS]: Recommends the use of lychee, a well-known open-source tool for checking URL links, which can be installed from its official GitHub repository.
  • [PROMPT_INJECTION]: Processes external content from Markdown files and code diffs which presents a surface for indirect prompt injection. This is mitigated by the interactive review process and the exclusion of sensitive files (e.g., .env, .pem, .key) from the analysis context.
  • Ingestion points: Reads docs/**/*.md and git diff output.
  • Boundary markers: Supports to skip regions.
  • Capability inventory: Can perform file writes via git apply and network HEAD requests via lychee.
  • Sanitization: Automatically redacts secrets and excludes gitignored files.
Audit Metadata
Risk Level
SAFE
Analyzed
May 9, 2026, 02:17 PM