code-repair-generation-combo
Pass
Audited by Gen Agent Trust Hub on Mar 6, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because it ingests and processes untrusted data from users.
- Ingestion points: The workflow in
SKILL.mdinvolves reading user-provided buggy code, natural language descriptions, failing test cases, and error messages. - Boundary markers: There are no specified delimiters or instructions to ignore embedded commands within the user-provided code or descriptions.
- Capability inventory: The skill utilizes the
Edittool for file modification and theBashtool for command execution (pytest,mvn,gradle, and binary execution). - Sanitization: The workflow does not describe any sanitization or validation of the user-provided inputs before they are analyzed or executed.
- [COMMAND_EXECUTION]: The skill explicitly instructs the agent to execute code provided or influenced by the user.
- Evidence:
SKILL.mdincludes instructions to runpytest test_file.py -v,mvn test,gradle test, and./test_executablevia a Bash tool. - Risk: If a user provides code that contains malicious side effects (e.g., system calls embedded in a C++ test or Python script), the agent will execute them as part of its 'verification' step.
Audit Metadata