github-code-interpreter
Pass
Audited by Gen Agent Trust Hub on Mar 18, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes
subprocess.runwithin a local Python script to executegit,tree,find, andwcfor repository analysis. It also runs a provided shell scriptscripts/review.shto monitor analysis status. - [EXTERNAL_DOWNLOADS]: The skill facilitates the cloning of external GitHub repositories to the local filesystem using
git clonebased on user-provided URLs. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection as it processes untrusted data from repository files like
README.mdand source code (Ingestion points:SKILL.mdSection 4). No explicit boundary markers or instructions to ignore embedded commands are provided (Boundary markers). The system provides capabilities for local script execution and filesystem access (Capability inventory), while sanitization is limited to regex-based URL validation (Sanitization). - [DATA_EXFILTRATION]: The skill accesses specific personal context files located at
~/Documents/coding/our/skills-wuming/to incorporate personal insights into the reports. This direct access to sensitive local file paths represents a data exposure risk within the generated output.
Audit Metadata