unit-testing-test-generate
Pass
Audited by Gen Agent Trust Hub on Apr 14, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface through the ingestion of external code files and the use of command execution tools.\n
- Ingestion points: Local source code files are read using the
analyze_filemethod.\n - Boundary markers: The skill lacks delimiters or instructions to ignore instructions embedded within the analyzed code's comments or logic.\n
- Capability inventory: The component uses
subprocess.runfor execution and has file read access.\n - Sanitization: No validation or sanitization is performed on the ingested code before processing.\n- [COMMAND_EXECUTION]: The
CoverageAnalyzerclass utilizessubprocess.runto execute test commands. This allows for the execution of arbitrary shell commands on the host machine if malicious input is supplied to the test runner argument.
Audit Metadata