project-status
Pass
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes several shell commands including
find,ls,wc,git log, andcatto collect metadata and file contents from the project directory. All commands are targeted at a fixed absolute path:/Users/anthonybyrnes/PycharmProjects/Python419/.- [PROMPT_INJECTION]: The skill possesses an indirect prompt injection surface as it reads and displays the body content of files that could potentially be influenced by external actors (e.g., TODOs and NEXT_STEPS files). * Ingestion points: Markdown files located in/docs/handoffs/,/docs/sessions/, and/docs/status/. * Boundary markers: The output format displays file content directly without specific delimiters or instructions to the agent to disregard embedded commands. * Capability inventory: The skill is limited to read-only operations and metadata extraction within the specified project structure. * Sanitization: The implementation usesyaml.safe_loadfor parsing frontmatter but does not apply sanitization to the main body of the markdown files.
Audit Metadata