security-auditor
Pass
Audited by Gen Agent Trust Hub on Mar 5, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Dynamic command assembly in shell scripts. The
scripts/detect-secrets.shscript utilizes theevalcommand to executefindandgrepoperations on the$TARGET_DIRvariable provided at runtime. This pattern creates a command injection surface if directory paths or filenames within the target project contain malicious shell metacharacters. - [EXTERNAL_DOWNLOADS]: Dependency auditing connects to remote registries. The
scripts/full-audit.shscript executesnpm auditandpip-auditto check for known vulnerabilities in project dependencies. These operations target well-known, trusted package registries (NPM and PyPI) and are documented neutrally as standard functionality for security auditing tools. - [PROMPT_INJECTION]: Susceptibility to indirect prompt injection through processed codebases. 1. Ingestion points:
scripts/owasp-check.pyandscripts/detect-secrets.shingest the contents of all files in the target directory for analysis. 2. Boundary markers: Absent. No explicit delimiters or warnings are used to instruct the agent to ignore potential instructions embedded in the 'evidence' or 'content' fields of the generated reports. 3. Capability inventory: The skill is authorized to useBash,Write,Read,Edit,Grep, andGlobtools, representing a high-impact capability set if an injection is successful. 4. Sanitization: Scanned content is sanitized via standard JSON serialization usingjqand the Pythonjsonlibrary before being included in audit reports.
Audit Metadata