security-auditor
Pass
Audited by Gen Agent Trust Hub on Mar 4, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill executes local Node.js and Python scripts (
security_scan.jsandsecurity_scan.py) to scan directories for potential vulnerabilities. These scripts are invoked via the command line with user-provided paths. - [EXTERNAL_DOWNLOADS]: The skill's documentation references pulling and running the
owasp/zap2docker-stableDocker image for dynamic security scanning. This resource belongs to the OWASP Foundation, a well-known security organization. - [PROMPT_INJECTION]: The skill presents an indirect prompt injection surface due to its analysis of untrusted external source code.
- Ingestion points: Untrusted data enters the agent's context when it reads files from a user-specified path for auditing.
- Boundary markers: No delimiters or 'ignore' instructions are present to prevent embedded malicious instructions in the audited code from influencing the LLM.
- Capability inventory: The agent has shell access to run Node.js, Python, and Docker, and it provides remediation recommendations.
- Sanitization: The skill does not perform any sanitization or filtering on the code content before it is processed by the agent.
Audit Metadata