zeroize-audit
Warn
Audited by Gen Agent Trust Hub on Apr 28, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill uses
uvanduvxto execute analysis scripts, which may involve downloading and running external packages from public registries. - [COMMAND_EXECUTION]: The skill uses the
Bashtool to execute internal shell scripts and system compiler components likeclangandcargoto perform its analysis tasks. - [REMOTE_CODE_EXECUTION]: The skill's
5b-poc-validatoragent compiles and runs Proof-of-Concept programs derived from the audited codebase, representing a dynamic execution risk of code generated based on untrusted inputs. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection from the repository it audits as it lacks sanitization and boundary markers between the audited data and the agent's instructions.
- [PROMPT_INJECTION]: Ingestion points: Audited source files within the repository specified by the
pathargument. - [PROMPT_INJECTION]: Boundary markers: None specified to separate audited code from instructions for the 11-phase agent pipeline.
- [PROMPT_INJECTION]: Capability inventory:
Bash,Write,Task,clang, andcargocompiler toolchains. - [PROMPT_INJECTION]: Sanitization: No input validation or sanitization is performed on the audited source code.
Audit Metadata