lint-and-validate
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [Command Execution] (SAFE): The
scripts/lint_runner.pyscript executes subprocesses to run linters likeruff,mypy, andeslint. All command strings are hardcoded or derived from standard project triggers. On Windows, it correctly handles command execution for.cmdfiles. This is standard and expected behavior for a developer tool. - [Data Exposure & Exfiltration] (SAFE): The skill reads local project files for static analysis and linting. No network operations, hardcoded credentials, or access to sensitive system paths (e.g., SSH keys) were detected.
- [Indirect Prompt Injection] (LOW): The skill possesses a surface for indirect prompt injection because it executes scripts defined in the target project's configuration files (e.g.,
npm run lintfrompackage.json). - Ingestion points:
package.jsonandpyproject.tomlin the project being analyzed. - Boundary markers: Absent; the agent is instructed to run these tools directly on project contents.
- Capability inventory:
subprocess.runcalls withinscripts/lint_runner.pycapable of executing project-defined scripts. - Sanitization: None; the skill is designed to execute the project's own defined quality control scripts.
Audit Metadata