file-organizer
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFECOMMAND_EXECUTIONNO_CODEPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (LOW): The skill relies on executing a local script
scripts/file_organizer.pyto perform file operations across the user's home directory. While documented for organization, this establishes a capability for broad file system manipulation. - [NO_CODE] (SAFE): The actual logic for file movement and classification is contained in an external script file (
scripts/file_organizer.py) which was not provided for this security audit. - [PROMPT_INJECTION] (LOW): Potential for indirect prompt injection. 1. Ingestion points: File names and metadata from directories like Downloads and Home. 2. Boundary markers: Absent. 3. Capability inventory: Automated file movement and directory creation via
file_organizer.py. 4. Sanitization: Not specified in documentation. - [DATA_EXPOSURE] (LOW): The skill identifies and interacts with sensitive directory paths, including the user's home directory and specific application configuration files (
~/.config/mole/whitelist.txt).
Audit Metadata