NYC

tdd-cycle

Pass

Audited by Gen Agent Trust Hub on Feb 13, 2026

Risk Level: LOWNO_CODE
Full Analysis

The SKILL.md file was analyzed for all 9 threat categories. The skill's primary content consists of instructional text, tables, and code examples for various Ruby on Rails test types. The YAML front matter specifies allowed-tools: Read, Write, Edit, Bash. The Bash commands present in the skill are limited to bin/rails test with various arguments, which are standard commands for executing tests in a Ruby on Rails project. These commands are local to the user's environment and do not involve network operations, sensitive file access, privilege escalation, or persistence mechanisms.

  • Prompt Injection: No patterns indicative of prompt injection (e.g., 'IMPORTANT: Ignore', 'Override', 'jailbroken') were found.
  • Data Exfiltration: No sensitive file paths (e.g., ~/.aws/credentials, ~/.ssh/id_rsa) or network operations (e.g., curl, wget to external, non-whitelisted domains) were detected.
  • Obfuscation: No Base64 encoding, zero-width characters, homoglyphs, or other obfuscation techniques were found. The content is clear and readable.
  • Unverifiable Dependencies: The skill does not instruct the installation of any external packages or dependencies (e.g., npm install, pip install, git clone). It assumes a pre-existing Rails development environment.
  • Privilege Escalation: No commands like sudo, doas, chmod +x, chmod 777, or modifications to system files were found.
  • Persistence Mechanisms: No attempts to modify user configuration files (.bashrc, .zshrc), create cron jobs, or install system services were detected.
  • Metadata Poisoning: The name and description fields in the YAML front matter are benign and accurately reflect the skill's purpose.
  • Indirect Prompt Injection: The skill is instructional and does not process external user-provided content in a way that would introduce this risk.
  • Time-Delayed / Conditional Attacks: No conditional logic based on dates, times, usage, or environment variables that could trigger malicious behavior was found.

Overall, the skill is a benign, educational resource for developers. The Bash commands are contextually appropriate and do not pose a security risk.

Audit Metadata
Risk Level
LOW
Analyzed
Feb 13, 2026, 08:00 AM