clean-code

Pass

Audited by Gen Agent Trust Hub on Feb 16, 2026

Risk Level: LOW
Full Analysis
  • [SAFE] (SAFE): A detailed review of all 13 files confirms the skill is purely instructional. No malicious instructions, obfuscation, or automated triggers were found within the documentation content.
  • [PROMPT_INJECTION] (INFO): While the skill is designed to process external content (code snippets), it possesses no functional capabilities such as network access, file system modification, or command execution. This absence of side-effect capabilities eliminates the risk of indirect prompt injection exploitation.
  • [CREDENTIALS_UNSAFE] (INFO): Pseudocode examples in solid/dependency-inversion.md include generic placeholders like 'password' and 'xxx' to illustrate architectural patterns; these are not functional or leaked credentials.
  • [COMMAND_EXECUTION] (INFO): The documentation mentions standard developer tools and commands (e.g., git, prettier, black) for educational purposes, but the skill itself does not provide any mechanism to execute these commands.
Audit Metadata
Risk Level
LOW
Analyzed
Feb 16, 2026, 09:40 AM