docs
Pass
Audited by Gen Agent Trust Hub on Mar 20, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is vulnerable to Indirect Prompt Injection. It ingests content from numerous untrusted sources within the project (documentation files, package manifests, CI/CD configs) and uses this data to drive its output and file-writing behavior.
- Ingestion points:
package.json,composer.json,pyproject.toml,Cargo.toml,docs/*.md,.github/workflows/,.gitlab-ci.yml,Jenkinsfile,Dockerfile,docker-compose.yml, route/controller definitions, and.env.example. - Boundary markers: Absent. There are no instructions to use delimiters or to ignore instructions embedded within the files being analyzed.
- Capability inventory: Command execution (
git log,git remote -v) and file system write/modify access (rootREADME.md,CLAUDE.md,AGENT.md, and all files in thedocs/directory). - Sanitization: Absent. Content read from the codebase is directly interpreted to deduce project descriptions and rewrite documentation sections.
- [COMMAND_EXECUTION]: The skill executes shell commands to gather project metadata, specifically
git log --oneline -10andgit remote -v. While these are used for context gathering, executing commands based on project state carries inherent risks if the repository or environment is malicious.
Audit Metadata