command-development
Pass
Audited by Gen Agent Trust Hub on Mar 24, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [SAFE]: Static analysis flags for destructive commands in
references/testing-strategies.mdare false positives. The file contains instructional examples for creating a large dummy file withddfor testing purposes and performing cleanup usingrmon those specific temporary files in the/tmp/directory. No actual destructive system commands targeting root or sensitive paths are present. - [COMMAND_EXECUTION]: The skill extensively documents the use of bash execution via the
!commandsyntax. It explains how to use these commands to gather project context, such asgit statusornpm test. The instructions include security-focused best practices, specifically recommending the use of theallowed-toolsfrontmatter field to restrict bash access to specific, safe subcommands (e.g.,Bash(git:*)). - [DYNAMIC_CONTEXT_INJECTION]: The skill provides guidance on the
!commandfeature which allows shell command execution at the time a slash command is processed. This is presented as a standard platform feature for dynamic context gathering. - [PROMPT_INJECTION]: The documentation includes validation patterns intended to prevent unintended behavior. It specifically teaches developers how to sanitize user-provided arguments using shell tools like
grepto ensure input matches expected patterns before processing, which is a key security mitigation.
Audit Metadata