code-audit-scripts
Fail
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The file
evals/benchmark.jsoncontains hardcoded synthetic credentials including an OpenAI project key (sk-proj-...), a PostgreSQL connection string with an embedded password, and a JWT secret key used as test fixtures. - [COMMAND_EXECUTION]: The skill uses the Bash tool to execute local shell scripts (
parallel-audit.sh,scan-secrets.sh,scan-debug.sh,scan-todos.sh) which perform recursive file system operations usinggrep. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because it ingests untrusted source code and provides the content to the agent.
- Ingestion points: Local source code files read by
grepin thescan-*.shutility scripts. - Boundary markers: Absent; the scripts return raw code snippets without explicit delimiters or instructions to ignore embedded commands.
- Capability inventory: The agent has access to the Bash tool and can execute arbitrary shell commands via the scripts provided in the skill.
- Sanitization: Minimal sanitization is performed via
sedto escape double quotes for JSON formatting, but the actual content of the code snippets is not filtered for malicious instructions.
Recommendations
- AI detected serious security threats
Audit Metadata