field-dev-code-recon
Pass
Audited by Gen Agent Trust Hub on Apr 9, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses the terminal to execute shell commands, including
findfor filesystem discovery andgh issue createandgit pushfor repository management. These commands are triggered based on data processed from external sources.- [DATA_EXFILTRATION]: By design, the skill pushes documentation and creates issues on GitHub. If manipulated via external content, this mechanism could be used to exfiltrate information from the local environment to an external repository.- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection. Ingestion points: Content is retrieved from external URLs usingbrowser_navigateandbrowser_snapshotin Phase 1 (SKILL.md). Boundary markers: None present; there are no instructions to the agent to treat the fetched content as data rather than instructions. Capability inventory: Includes filesystem searching (find), file writing, GitHub issue creation (gh), and Git operations (git push). Sanitization: None present; extracted content is directly used to generate mapping documentation and populate issue bodies.
Audit Metadata