tdd-cycle
Audited by Gen Agent Trust Hub on Feb 13, 2026
The SKILL.md file was analyzed for all 9 threat categories. The skill's primary content consists of instructional text, tables, and code examples for various Ruby on Rails test types. The YAML front matter specifies allowed-tools: Read, Write, Edit, Bash. The Bash commands present in the skill are limited to bin/rails test with various arguments, which are standard commands for executing tests in a Ruby on Rails project. These commands are local to the user's environment and do not involve network operations, sensitive file access, privilege escalation, or persistence mechanisms.
- Prompt Injection: No patterns indicative of prompt injection (e.g., 'IMPORTANT: Ignore', 'Override', 'jailbroken') were found.
- Data Exfiltration: No sensitive file paths (e.g.,
~/.aws/credentials,~/.ssh/id_rsa) or network operations (e.g.,curl,wgetto external, non-whitelisted domains) were detected. - Obfuscation: No Base64 encoding, zero-width characters, homoglyphs, or other obfuscation techniques were found. The content is clear and readable.
- Unverifiable Dependencies: The skill does not instruct the installation of any external packages or dependencies (e.g.,
npm install,pip install,git clone). It assumes a pre-existing Rails development environment. - Privilege Escalation: No commands like
sudo,doas,chmod +x,chmod 777, or modifications to system files were found. - Persistence Mechanisms: No attempts to modify user configuration files (
.bashrc,.zshrc), create cron jobs, or install system services were detected. - Metadata Poisoning: The
nameanddescriptionfields in the YAML front matter are benign and accurately reflect the skill's purpose. - Indirect Prompt Injection: The skill is instructional and does not process external user-provided content in a way that would introduce this risk.
- Time-Delayed / Conditional Attacks: No conditional logic based on dates, times, usage, or environment variables that could trigger malicious behavior was found.
Overall, the skill is a benign, educational resource for developers. The Bash commands are contextually appropriate and do not pose a security risk.