java-vuln-scanner
Pass
Audited by Gen Agent Trust Hub on Apr 11, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface because it ingest and analyzes untrusted code and configuration files from a user's project.
- Ingestion points: Reads
pom.xml,build.gradle,.javasource files, and environment configurations likeapplication.ymlandweb.xml(SKILL.md). - Boundary markers: There are no explicit instructions to wrap ingested content in delimiters or to ignore potential instructions embedded within comments or strings in the source code.
- Capability inventory: The skill has the ability to execute shell commands via a Python scanner and a Java JAR, and it uses a Write tool to save files.
- Sanitization: The AI analysis step (Step 5 in SKILL.md) lacks verification or sanitization of the project content, which could allow malicious code comments to influence the final vulnerability report.
- [COMMAND_EXECUTION]: The skill uses local command execution to perform its scanning and decompilation tasks.
- Executes
python3 scripts/scan_dependencies.pyto identify library versions and match them against regex patterns in a YAML database. - Provides instructions to run
java -jar {CFR_JAR}for decompiling bytecode into source code for further analysis. - [DATA_EXFILTRATION]: The skill accesses sensitive project configuration files that frequently contain credentials or architectural secrets.
- Specifically targets
application.yml,application.properties,web.xml, andstruts.xmlfor environmental analysis. While no external network exfiltration was found, the systematic aggregation of this data into a single audit report represents an exposure risk if the report is later moved or shared.
Audit Metadata