wiki-discover
Pass
Audited by Gen Agent Trust Hub on Mar 29, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes
git statusandgit diffto identify recently created or modified files within the repository. This is a standard and expected operation for a tool designed to track project documentation changes. - [EXTERNAL_DOWNLOADS]: The documentation references an external skill
dev-goraebap/agent-wiki-hubas a prerequisite. Since this resource belongs to the same author (dev-goraebap), it is a legitimate vendor resource used to establish the required wiki environment. - [DATA_EXPOSURE]: The skill reads the content of local markdown and YAML files to infer their documentation type (e.g., architecture, decision, task). This analysis is performed locally to assist the user in categorizing documents within the project's wiki structure.
- [PROMPT_INJECTION]: The skill processes untrusted data by reading the content of files within the project directory. While this presents a potential surface for indirect prompt injection, the risk is minimal as the data is used for local categorization and no sensitive automated actions are triggered by the file content. The evidence chain is as follows:
- Ingestion points: Reads
.md,.mmd,.yaml, and.ymlfiles discovered via Git. - Boundary markers: No explicit delimiters are used when processing file content for type inference.
- Capability inventory: Limited to
bashfor Git commands and local file read/write operations within the project's.wikidirectory. - Sanitization: Content is read for inference but not explicitly sanitized before being used in the agent's internal reasoning process.
Audit Metadata