octocode-roast
Pass
Audited by Gen Agent Trust Hub on Mar 12, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it processes untrusted code content from the user's repository.
- Ingestion points: The skill uses
localGetFileContentandlocalSearchCodeto read and analyze file contents from the user's workspace during target acquisition and sin inventory phases. - Boundary markers: No specific boundary markers or instructions to ignore instructions embedded within the code comments or strings are defined in the execution flow.
- Capability inventory: The skill has significant capabilities, including reading any file in the workspace and modifying files during the "Resurrection" phase.
- Sanitization: No explicit sanitization or filtering of the processed code content is described before it is processed by the LLM.
- [COMMAND_EXECUTION]: The skill has the capability to modify local source code files to apply recommended fixes.
- Evidence: The "Resurrection" phase (Phase 6) in
SKILL.mdexplicitly details modifying files, deleting lines, and adding lines based on user-selected fixes. - Mitigation: The skill includes a "Wait for Consent" rule and a specific user checkpoint (Phase 5) before any modifications are executed.
- [DATA_EXFILTRATION]: The skill is designed to search for and expose sensitive data within the user's own codebase.
- Evidence: The "Sin Registry" in
references/sin-registry.mdcontains search patterns for hardcoded secrets such aspassword,api_key,secret, andtoken. - Context: While this involves accessing sensitive data, it is a core feature of the skill's security auditing purpose and does not include mechanisms for unauthorized external transmission.
Audit Metadata