file-organizer

Pass

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: SAFECOMMAND_EXECUTIONNO_CODEPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION] (LOW): The skill relies on executing a local script scripts/file_organizer.py to perform file operations across the user's home directory. While documented for organization, this establishes a capability for broad file system manipulation.
  • [NO_CODE] (SAFE): The actual logic for file movement and classification is contained in an external script file (scripts/file_organizer.py) which was not provided for this security audit.
  • [PROMPT_INJECTION] (LOW): Potential for indirect prompt injection. 1. Ingestion points: File names and metadata from directories like Downloads and Home. 2. Boundary markers: Absent. 3. Capability inventory: Automated file movement and directory creation via file_organizer.py. 4. Sanitization: Not specified in documentation.
  • [DATA_EXPOSURE] (LOW): The skill identifies and interacts with sensitive directory paths, including the user's home directory and specific application configuration files (~/.config/mole/whitelist.txt).
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 17, 2026, 06:10 PM