safe-refactor
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [Indirect Prompt Injection] (HIGH): The skill processes untrusted code (the target of refactoring) and has permissions to write files and execute shell commands (test runners). This combination allows for indirect prompt injection where malicious instructions hidden in code comments or test files could be executed by the agent. * Ingestion points: Code blocks and files provided by the user via triggers like 'Refactor this'. * Boundary markers: Absent; the skill does not use delimiters to isolate untrusted code. * Capability inventory:
file:writeandbash:npm, pytest, jestdefined in SKILL.md. * Sanitization: Absent; there is no logic to filter or ignore instructions embedded in the provided code.- [Command Execution] (MEDIUM): The skill uses tools likenpm,pytest, andjestwhich execute code. If the environment contains malicious configuration files (e.g., apackage.jsonwith a malicioustestscript) or if the user includes malicious tests in the refactor, the agent will execute them during the verification phase.
Recommendations
- AI detected serious security threats
Audit Metadata