util-multi-file-refactor
Pass
Audited by Gen Agent Trust Hub on Feb 24, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to Indirect Prompt Injection because it processes untrusted data (external codebase) that could contain malicious instructions designed to influence the agent's behavior during refactoring.
- Ingestion points: Codebase files accessed via
Read,Grep, andGlobtools. - Boundary markers: Absent. The instructions do not include specific delimiters or directives to ignore instructions embedded within the code being analyzed.
- Capability inventory: Extensive. Includes
Bash(shell execution),Edit/MultiEdit(file modification), andRead(file access). - Sanitization: Absent. The agent is directed to search for and replace strings directly within the codebase without content filtering.
- [COMMAND_EXECUTION]: The skill workflow relies on the
Bashtool to execute external binaries for "Quality Gates" and build processes. - Evidence: The
SKILL.mdandreferences/quality-gates.mdfiles instruct the agent to run commands such aspytest,npm run build,go build,cargo test, anduv run pyright. - Context: These operations are standard for software development and refactoring, but they grant the agent the ability to execute arbitrary code in the environment where the skill is active.
Audit Metadata