code-quality-specialist
Pass
Audited by Gen Agent Trust Hub on Mar 16, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: The skill processes user-supplied problem descriptions which are subsequently interpolated into prompts for sub-agents and external analysis calls, creating a risk for indirect prompt injection.
- Ingestion points: The
user_issue_descriptionfield is collected from user input inaction-init.md. - Boundary markers: While the skill uses structured prompt templates (e.g.,
[CONTEXT],[TASK],[INPUT]) in files likeaction-analyze-requirements.mdandaction-gemini-analysis.md, these are insufficient to fully prevent adversarial manipulation of the prompt logic. - Capability inventory: The skill can read and write files, execute shell commands, and invoke other sub-agents through the
Tasktool. - Sanitization: No explicit sanitization or filtering is applied to the user description before it is embedded into LLM prompts.
- [COMMAND_EXECUTION]: The skill dynamically constructs and executes shell commands using the
Bashtool to perform advanced analysis. - Evidence: In
action-gemini-analysis.md, the skill builds a command for theccw clithat includes user-derived strings. Although a basicescapeForShellfunction is used, this pattern of dynamic command construction is inherently sensitive. - [REMOTE_CODE_EXECUTION]: As part of its primary functionality, the skill is capable of generating code changes and writing them directly to the filesystem in
action-apply-fix.md. While necessary for a refactoring tool, this capability allows for significant modifications to the user's workspace. - [EXTERNAL_DOWNLOADS]: The skill references and interacts with the Google Gemini service via a CLI tool to perform codebase analysis. This involves transmitting local file content to a remote, well-known technology provider as part of the analysis workflow.
Audit Metadata