ui-code-auditor
Pass
Audited by Gen Agent Trust Hub on May 14, 2026
Risk Level: SAFE
Full Analysis
- [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface as its primary function involves reading and processing the content of untrusted source code files (e.g., React or Rails components). If these files contain malicious instructions, they could theoretically attempt to influence the agent's audit findings. However, given the specific purpose of the skill and the use of defined rule sets, this risk is minimal.
- Ingestion points: Content from UI files located in
src/orapp/is read and processed in Step 4. - Boundary markers: The instructions do not define specific delimiters for separating the file content from the agent's instructions.
- Capability inventory: The skill has access to the
Bash,Read,Grep, andGlobtools. - Sanitization: The skill does not perform content sanitization, which is expected for a code auditing tool.
- [COMMAND_EXECUTION]: The skill uses the
Bashtool to perform file discovery (via thefindcommand). The commands documented in the instructions are restricted to local file listing and do not incorporate unvalidated user input into shell execution in a dangerous manner.
Audit Metadata