oh-precommit-codecheck
Pass
Audited by Gen Agent Trust Hub on Apr 9, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: Fetches the CodeArts codecheck engine and custom clang-tidy binaries from Huawei's Object Storage Service (OBS) during initialization.
- Evidence:
scripts/setup.shusescurlto download zip archives fromhttps://codeheck-chajian-bj4-obs.obs.cn-north-4.myhuaweicloud.com/into the~/.codecheck-tools/directory. - [COMMAND_EXECUTION]: Executes the downloaded analysis engine and various system-installed linters to evaluate source code files.
- Evidence:
scripts/check.shinvokesjava -jarfor the CodeArts engine and runs shell commands forpylint,flake8,shellcheck, andgn formatbased on file extensions. - [PROMPT_INJECTION]: The skill processes untrusted code files which could theoretically contain malicious instructions targeting the agent via Indirect Prompt Injection.
- Ingestion points: Processes local source files including
.cpp,.py,.sh, and.gnfiles within the repository. - Boundary markers: The agent is instructed to parse structured, pipe-delimited output from the shell scripts rather than raw linter output.
- Capability inventory: The agent has access to the
EditandWritetools to perform auto-fixes, and shell execution via the skill's scripts. - Sanitization: Scripts like
check_python.shandcheck_shell.shincludesedpatterns to remove delimiter characters (|) from linter messages, ensuring the agent receives correctly formatted data and preventing interpretation of injected control characters.
Audit Metadata