test-deduplicator
Pass
Audited by Gen Agent Trust Hub on Mar 6, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection (Category 8) as it processes external, potentially attacker-controlled test files.
- Ingestion points: The
scripts/semantic_analyzer.pyscript parses Python files in thetests/directory using theastmodule, andscripts/coverage_analyzer.pyloads coverage data from JSON files. - Boundary markers: The skill lacks explicit boundary markers or system instructions to ignore instructions embedded within the test code or comments being analyzed.
- Capability inventory: The skill possesses the capability to execute shell commands via
subprocess.runwithinscripts/coverage_analyzer.py. - Sanitization: No validation or sanitization is performed on the test file content or filenames before they are processed or used in command execution.
- [COMMAND_EXECUTION]: The
scripts/coverage_analyzer.pyscript implements arun_coverage_for_testmethod that usessubprocess.runto execute arbitrary strings as commands. While this is used for the intended purpose of running test suites (e.g., viapytest), it represents a powerful capability that could be exploited if an attacker can influence the command string through indirect injection in test files or metadata.
Audit Metadata