code-refinement
Pass
Audited by Gen Agent Trust Hub on Mar 4, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill makes extensive use of
Bashto execute static analysis pipelines involvingfind,grep,awk,sed,xargs,ls, andwc. These commands are used to scan source code for patterns related to duplication, complexity, and architectural violations. - [COMMAND_EXECUTION]: In
modules/duplication-analysis.md, the skill executes a local Python script located atplugins/conserve/scripts/detect_duplicates.py. This is an expected behavior for a tool leveraging local plugins for enhanced analysis. - [COMMAND_EXECUTION]: The module
code-quality-analysis.mdutilizes the GitHub CLI (gh) to retrieve diffs for pull request analysis, which is a standard operation for PR review tools. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection (Category 8) because it ingests and processes untrusted data from local source files.
- Ingestion points: Files are read via
grep,sed, andawkin all provided modules (e.g.,modules/clean-code-checks.md,modules/algorithm-efficiency.md). - Boundary markers: No explicit delimiters or instructions to ignore embedded content are used when processing file content.
- Capability inventory: The skill has the capability to execute
Bashcommands and run a localpython3script. - Sanitization: There is no evidence of sanitization or filtering of the content extracted from source files before it is processed or presented to the agent.
Audit Metadata