finding-duplicate-functions

Pass

Audited by Gen Agent Trust Hub on Mar 24, 2026

Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
  • [PROMPT_INJECTION]: Indirect prompt injection surface detected.\n
  • Ingestion points: scripts/extract-functions.sh extracts code context and function signatures from the target source directory to be analyzed by subagents.\n
  • Boundary markers: The prompt templates in scripts/categorize-prompt.md and scripts/find-duplicates-prompt.md use delimiters for data insertion but lack explicit instructions to ignore potentially malicious commands embedded in the source code.\n
  • Capability inventory: The skill uses ripgrep and jq for extraction, and expects subagents to use a Write tool for outputting results.\n
  • Sanitization: No sanitization is performed on the extracted code content before it is processed by LLM subagents, allowing for potential manipulation of the agent via malicious code comments or names.\n- [COMMAND_EXECUTION]: Execution of local CLI tools for code extraction and data transformation.\n
  • Evidence: scripts/extract-functions.sh calls ripgrep and jq; scripts/prepare-category-analysis.sh and scripts/generate-report.sh utilize jq.\n
  • Context: These commands are central to the skill's intended functionality and are implemented using standard bash security practices like set -euo pipefail and quoted variables.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 24, 2026, 11:03 AM