skills/giuseppe-trisciuoglio/developer-kit-claude-code/nestjs-drizzle-crud-generator/Gen Agent Trust Hub
nestjs-drizzle-crud-generator
Pass
Audited by Gen Agent Trust Hub on Apr 1, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION]: The
scripts/generate_crud.pyscript exhibits an indirect prompt injection surface by accepting unvalidated input from the agent's context and using it for file system operations. - Ingestion points: The
--featureand--fieldsarguments inscripts/generate_crud.pyare populated from user-controlled input. - Boundary markers: Absent; there are no instructions or delimiters defining the boundary between trusted instructions and untrusted data.
- Capability inventory: The script uses the
Bashtool and Python'spathlibto create directories (mkdir) and write multiple files (write_text) to the local file system. - Sanitization: Absent; the script performs basic case conversion but does not filter for path traversal sequences like
../or sanitize inputs used in template string replacement, which could allow a malicious user to control the output path or inject code into the generated NestJS modules. - [COMMAND_EXECUTION]: The skill relies on executing a local Python script via the
Bashtool to perform its primary function. This script dynamically constructs a directory structure and writes multiple source files based on user-supplied parameters.
Audit Metadata