code-review
Pass
Audited by Gen Agent Trust Hub on Mar 14, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection through the analysis of untrusted code.
- Ingestion points: Code is read from the local file system and git history using
cat,find, andgit diffas described inSKILL.md(Steps 1 and 2). - Boundary markers: The prompts used to trigger sub-agents in
SKILL.md(Step 3) lack explicit delimiters or "ignore embedded instructions" warnings for the ingested code content. - Capability inventory: The skill can execute shell commands (
npm,npx,git,bd) and trigger multiple LLM sub-agents via theTasktool. - Sanitization: There is no evidence of sanitization or filtering of the code content before it is passed to the sub-agents.
- [COMMAND_EXECUTION]: The skill executes development tools that can run arbitrary code defined in the project being reviewed.
- Evidence:
SKILL.mdinvokesnpx tsc --noEmitandnpm run lint. These tools execute scripts and configurations defined within the project's ownpackage.jsonor configuration files, which could lead to arbitrary code execution if the repository under review is malicious.
Audit Metadata