vibecoding-refactor
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: CRITICALCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- COMMAND_EXECUTION (LOW): The skill instructs the agent to use local shell utilities such as
ripgrep(rg),fd, andgitto analyze the project structure, dependencies, and code quality. These operations are essential for the skill's purpose and are conducted within the local workspace. - PROMPT_INJECTION (LOW): (Category 8: Indirect Prompt Injection)
- Ingestion points: Project source code files are read and analyzed using regex patterns via
rgandfd. - Boundary markers: Absent; there are no specific instructions or delimiters used to ensure the agent ignores natural language instructions that might be embedded within the code comments or strings of the project being refactored.
- Capability inventory: The agent has capabilities to execute shell commands, manage files (mkdir, mv), and perform git operations.
- Sanitization: Absent; codebase content is treated as raw data for analysis.
- Automated Scanner Alert (SAFE): The scanner alert for
logger.infois a confirmed false positive. The string was identified as a malicious URL likely due to the.infoTLD; however, in the context ofanalysis/quality-assessment.md, it is part of a regex pattern (console.(log|debug|info)) used to identify logging statements for removal or refactoring.
Recommendations
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata