analysis-codebase
Pass
Audited by Gen Agent Trust Hub on Feb 25, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes a bundled local script
scripts/detect-stack.shand various shell utilities includinggrep,find,ls, andcat. These commands are used to discover project structure and configuration and are limited to the context of the local project directory.\n- [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection vulnerability surface as it ingests and processes untrusted content from the codebase being analyzed.\n - Ingestion points: The skill reads several project configuration files such as
package.json,pyproject.toml,Gemfile, andgo.mod, as well as source code content viagrepand thedetect-stack.shscript.\n - Boundary markers: There are no explicit delimiters or specific instructions for the agent to ignore potentially malicious content embedded in the analyzed files.\n
- Capability inventory: The skill allows for local file system access and the execution of shell scripts and common CLI tools like
jqandgrep.\n - Sanitization: The data extracted from external files is incorporated into markdown reports and JSON inventories without explicit sanitization or escaping of the content.
Audit Metadata