audit-full
Pass
Audited by Gen Agent Trust Hub on Apr 29, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses the
Bashtool to execute an internal script (scripts/estimate-tokens.sh) that estimates the line count and token budget for the audit. This script uses standard utilities such asfind,wc, andawk. The execution is restricted to counting files and does not involve network operations or privilege escalation.- [PROMPT_INJECTION]: The skill identifies an attack surface for indirect prompt injection (Category 8) due to its core functionality of reading and processing the full content of untrusted repositories. \n - Ingestion points: The agent reads the entire codebase using the
Read,Glob, andGreptools, as specified inSKILL.mdand the loading strategy inreferences/report-structure.md. \n - Boundary markers: Although the skill organizes work into tasks, it does not explicitly use isolated delimiters or instructions to prevent content within the audited files from being interpreted as agent commands. \n
- Capability inventory: The agent has access to powerful tools, including
Bash,Read, andTaskCreate, which could be targeted by instructions hidden in a malicious repository. \n - Sanitization: There is no pre-processing or sanitization identified that would strip instructions or delimiters from the audited files before the model processes them.
Audit Metadata