opensrc-inspect
Pass
Audited by Gen Agent Trust Hub on Mar 19, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses a custom CLI tool named
opensrcto manage local snapshots and fetch repository contents.- [EXTERNAL_DOWNLOADS]: The skill fetches source code from external, untrusted sources including GitHub, PyPI, and Crates.io.- [PROMPT_INJECTION]: The skill presents an indirect prompt injection surface when processing external source code. - Ingestion points: External code is fetched into the
opensrc/directory for inspection (identified inSKILL.md). - Boundary markers: The instructions advise using
--modify=falseand treating files as read-only, but do not provide explicit delimiters or instructions for the agent to ignore natural language commands found within the code files. - Capability inventory: The agent can read fetched files and execute commands via the
opensrctool and other available skills (identified inSKILL.mdandagents/openai.yaml). - Sanitization: No sanitization or filtering of the content is performed before the agent reads and analyzes the downloaded source code.
Audit Metadata