just-init
Pass
Audited by Gen Agent Trust Hub on Apr 16, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill instructs the agent to use shell utilities like
grepandheadto determine docstring boundaries within files. While the pattern is specific to line counting, executing shell commands on local project files is a capability that requires monitoring. - [PROMPT_INJECTION]: The skill establishes a pattern for indirect prompt injection by teaching the agent to treat
__init__.pydocstrings as a "docstring tree" to "decide which files to explore next." If the agent processes a malicious or compromised repository, instructions embedded in these docstrings could redirect the agent to specific files or override its navigation logic. - Ingestion points: The contents of
__init__.pyfiles across the codebase (SKILL.md). - Boundary markers: Absent. The skill does not define delimiters or instructions to ignore executable directives within the docstrings.
- Capability inventory: Use of
grepandheadvia shell, file reading, and file writing (docstring updates). - Sanitization: None. The skill does not validate or filter the content of the docstrings before the agent uses them for decision-making.
Audit Metadata