code-analyze
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- Indirect Prompt Injection (HIGH): The skill is vulnerable to indirect injection because it processes untrusted project files and uses them in command execution.- Ingestion points: The skill accepts a
project_pathinput and reads files from that directory (e.g.,.csproj,.pre-commit-config.yaml).- Boundary markers: No boundary markers or clear 'ignore instructions' guards are present to prevent the agent from being influenced by malicious content inside the code files.- Capability inventory: The skill executes powerful commands includingdotnet build,pre-commit, and a local scriptanalyze.sh.- Sanitization: No sanitization is performed on the project contents before execution, allowing for malicious MSBuild targets or pre-commit hooks to run code.- Command Execution (HIGH): The use ofdotnet buildon untrusted code is dangerous because .NET project files can contain custom targets that execute arbitrary shell commands during the build process.- Unverifiable Dependencies (MEDIUM): The skill runsdotnet list package --vulnerableandpre-commitwhich access external package registries and configuration files that can be controlled by a repository owner.
Recommendations
- AI detected serious security threats
Audit Metadata