security-auditor
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- Indirect Prompt Injection (LOW): The skill provides powerful auditing capabilities that can be directed at arbitrary URLs or file paths. An attacker could use indirect prompt injection (e.g., instructions hidden in a website's metadata or a code comment) to trick the agent into running security scans against internal infrastructure or sensitive files.
- Ingestion points:
target_urlparameter indast_scan.pyandpathparameters insast_scan.py,audit_dependencies.py, anddetect_secrets.py. - Boundary markers: Absent. The skill does not implement delimiters or system-level instructions to ignore embedded commands in the data it processes.
- Capability inventory: Executes multiple security tools via
subprocess.run, includingzap-cli,nikto,sqlmap,semgrep,codeql,bandit, andsafety. - Sanitization:
dast_scan.pyperforms a basic check to ensure URLs start withhttp://orhttps://, but lacks deep validation of targets (e.g., blocking internal IP ranges). - Command Execution (SAFE): The skill frequently executes external binaries to perform its auditing functions. All subprocess calls are implemented using list-based arguments rather than shell strings, effectively mitigating the risk of command injection through the script inputs. This behavior is consistent with the skill's primary purpose of security auditing.
Audit Metadata