team-review
Pass
Audited by Gen Agent Trust Hub on Apr 17, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The code modification verification step in
roles/fixer/role.mdexecutes project-specific test suites such aspytest,jest, andnpx tscusing theBashtool. A malicious project could include configurations designed to execute arbitrary code during these standard verification steps. - [PROMPT_INJECTION]: The skill architecture is susceptible to indirect prompt injection (Category 8) because it ingests untrusted codebase data into LLM prompts. Malicious code could influence the analysis or fixing logic performed by the sub-agents.
- Ingestion points: Files are read using
GlobandReadtools in thescannerandreviewerroles. - Boundary markers: Absent. Source code is interpolated into prompts for the
maestro delegatetool without robust delimiters or isolation instructions. - Capability inventory: The skill possesses significant capabilities, including
Edit(file modification) andBash(command execution). - Sanitization: LLM-generated findings and fixes are not sanitized or validated before being used to modify the project or run verification commands.
Audit Metadata