security-ownership-map

Pass

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION] (LOW): The script scripts/run_ownership_map.py executes a secondary script build_ownership_map.py via subprocess.run. This script and others mentioned in the documentation (query_ownership.py, community_maintainers.py) were not provided, preventing a full security audit of the execution logic.\n- [EXTERNAL_DOWNLOADS] (LOW): The skill documentation requires the user to install the networkx library from an external registry (PyPI).\n- [PROMPT_INJECTION] (LOW): Potential for Indirect Prompt Injection (Category 8) exists as the tool processes untrusted git metadata (author names, commit messages).\n
  • Ingestion points: Git repository logs analyzed by the mapping scripts.\n
  • Boundary markers: None identified; output is generated in CSV/JSON formats without explicit instruction isolation.\n
  • Capability inventory: The skill performs file system reads and subprocess execution.\n
  • Sanitization: No sanitization of git metadata was found in the wrapper script; malicious content in the repository history could influence agent behavior when interpreting analysis results.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 17, 2026, 06:18 PM