unit-testing-test-generate

Pass

Audited by Gen Agent Trust Hub on Apr 14, 2026

Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface through the ingestion of external code files and the use of command execution tools.\n
  • Ingestion points: Local source code files are read using the analyze_file method.\n
  • Boundary markers: The skill lacks delimiters or instructions to ignore instructions embedded within the analyzed code's comments or logic.\n
  • Capability inventory: The component uses subprocess.run for execution and has file read access.\n
  • Sanitization: No validation or sanitization is performed on the ingested code before processing.\n- [COMMAND_EXECUTION]: The CoverageAnalyzer class utilizes subprocess.run to execute test commands. This allows for the execution of arbitrary shell commands on the host machine if malicious input is supplied to the test runner argument.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 14, 2026, 06:24 PM