sapcc-audit
Pass
Audited by Gen Agent Trust Hub on Apr 1, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it reads and processes all Go source files within a target repository. Maliciously crafted code or comments could potentially influence the auditing sub-agent's behavior.
- Ingestion points: The skill reads the
go.modfile and all.gofiles in the repository during Phase 1 and Phase 2. - Boundary markers: The dispatch instructions do not implement specific delimiters or 'ignore' instructions to isolate untrusted file content from the sub-agent's prompt context.
- Capability inventory: The skill uses
Read,Write,Edit, andBashtools, which could be misused if an agent is successfully subverted by injected instructions. - Sanitization: No sanitization or content filtering is performed on the ingested source code before it is analyzed by the sub-agents.
- [COMMAND_EXECUTION]: The skill uses the
Bashtool to execute shell commands for repository discovery and verification. - Evidence: Executes
head,grep,find, andsedcommands in Phase 1 to inspect thego.modfile and map the package structure of the repository.
Audit Metadata