security-scanning-security-sast
Pass
Audited by Gen Agent Trust Hub on Mar 4, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The Python implementation of the
MultiLanguageSASTScanner(found insub-skills/expressjs.md) uses thesubprocessmodule to execute external security tools. - The
run_semgrep_scanmethod executes thesemgrepcommand with specified rulesets and paths. - The execution is performed using
subprocess.runwith argument lists, which is the recommended secure pattern to prevent command injection. - [EXTERNAL_DOWNLOADS]: The CI/CD integration examples for GitHub Actions and GitLab CI (
sub-skills/github-actions.mdandsub-skills/gitlab-ci.md) describe the installation of security packages from official registries. - Documentation includes commands to install
bandit,semgrep, andeslintusingpipandnpm. - These downloads target well-known, trusted security tools required for the skill's primary function.
- [PROMPT_INJECTION]: The skill's primary function involves reading and analyzing external source code provided by the user.
- While no direct prompt injection was found in the skill's own instructions, the ingestion of untrusted codebase data through
Path.globand tool analysis creates an attack surface for indirect prompt injection. - Maliciously crafted comments or metadata within a scanned codebase could attempt to influence the agent's interpretation of security findings.
Audit Metadata