universal-quality-gate
Warn
Audited by Gen Agent Trust Hub on Apr 1, 2026
Risk Level: MEDIUMPROMPT_INJECTIONREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- [DYNAMIC_EXECUTION]: The script
scripts/run_quality_gate.pyuses dynamic path manipulation to import thequality_gatelibrary from a computed directory (../../../../hooks/lib). This allows code execution from a path determined at runtime outside of the skill's own directory. - [INDIRECT_PROMPT_INJECTION]: The skill processes untrusted source code files from the project directory to perform linting, creating a surface for indirect prompt injection. 1. Ingestion points: Source code files (e.g.,
.py,.js,.go) identified by markers likepackage.jsonorpyproject.tomlin the analyzed repository. 2. Boundary markers: No delimiters or protective instructions are placed around the ingested content in the entry script. 3. Capability inventory: The skill has access to theBashtool to execute external commands and theReadtool to scan file contents. 4. Sanitization: The script does not perform sanitization or validation of the source code content or the resulting linter output before presenting it to the agent.
Audit Metadata