512-frameworks-micronaut-data
Pass
Audited by Gen Agent Trust Hub on Apr 27, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill directs the agent to execute
./mvnw compileand./mvnw clean verifyto validate the application state during refactoring. These are standard Java development commands.\n- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it processes user-provided Java source code while having access to sensitive capabilities like shell command execution.\n - Ingestion points: The agent reads and analyzes Java project files provided by the user.\n
- Boundary markers: There are no explicit delimiters used to separate the content of the user's code from the agent's instructions.\n
- Capability inventory: The agent has the ability to read and write files and execute Maven commands.\n
- Sanitization: No sanitization or filtering is applied to the ingested source code to prevent embedded instructions from influencing the agent's logic.
Audit Metadata