tech-dd-analyst
Warn
Audited by Gen Agent Trust Hub on Mar 4, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes shell commands using
child_process.execSyncinsrc/lib.tsto analyze git contribution history. - Evidence: The command
git log --format="%an" --since="${since}" | sort | uniq -c | sort -rnis executed. - Context: The
${since}variable is sourced from an external configuration file (rules.json) loaded viaKnowledgeProvider. The command is executed within the context of a user-provided directory (argv.dir), which is passed as thecwdoption. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it processes untrusted external data (source code files) and possesses powerful capabilities.
- Ingestion points: The skill reads source files (
.js,.ts,.py) from the target directory insrc/lib.ts(assessCodeQuality). - Boundary markers: No boundary markers or "ignore" instructions are used when reading and processing file content.
- Capability inventory: The skill can execute shell commands (
execSync), read arbitrary files in the target directory (fs.readFileSync), and write reports to disk (safeWriteFile). - Sanitization: No sanitization or validation of the ingested code content is performed before processing or including it in the logic flow.
Audit Metadata