yy-frontend-vue2-review
Pass
Audited by Gen Agent Trust Hub on May 7, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is vulnerable to Indirect Prompt Injection. It reads and analyzes code files from the
srcdirectory which are considered untrusted input. Maliciously crafted comments or strings within these files could attempt to override the agent's instructions (e.g., instructing the agent to ignore errors or approve malicious code). - Ingestion points: The skill uses
git diffand thereadtool to ingest file content from thesrcdirectory during Phase 2 of the workflow. - Boundary markers: No explicit boundary markers or 'ignore embedded instructions' warnings are used when interpolating file content into the analysis context.
- Capability inventory: The agent has the ability to use the
edittool to modify files and call an external skillyy-frontend-committo finalize changes. - Sanitization: There is no evidence of sanitization or filtering of the file content before it is processed by the LLM.
- [COMMAND_EXECUTION]: The skill uses shell commands via the
gittool (git diff --name-only HEADandgit diff --cached --name-only) to identify changed files. While these are standard operations for a code review tool, they represent a surface for potential command injection if file names or repository states are maliciously manipulated, though this is a standard risk for development tools.
Audit Metadata