security-ownership-map
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (LOW): The script
scripts/run_ownership_map.pyexecutes a secondary scriptbuild_ownership_map.pyviasubprocess.run. This script and others mentioned in the documentation (query_ownership.py,community_maintainers.py) were not provided, preventing a full security audit of the execution logic.\n- [EXTERNAL_DOWNLOADS] (LOW): The skill documentation requires the user to install thenetworkxlibrary from an external registry (PyPI).\n- [PROMPT_INJECTION] (LOW): Potential for Indirect Prompt Injection (Category 8) exists as the tool processes untrusted git metadata (author names, commit messages).\n - Ingestion points: Git repository logs analyzed by the mapping scripts.\n
- Boundary markers: None identified; output is generated in CSV/JSON formats without explicit instruction isolation.\n
- Capability inventory: The skill performs file system reads and subprocess execution.\n
- Sanitization: No sanitization of git metadata was found in the wrapper script; malicious content in the repository history could influence agent behavior when interpreting analysis results.
Audit Metadata