sonarcloud-analysis

Warn

Audited by Gen Agent Trust Hub on Mar 15, 2026

Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
  • [DATA_EXFILTRATION]: The skill is instructed to read from and source .env.local files to obtain authentication credentials. Accessing local environment files is a sensitive operation as these files often contain various project secrets and private configuration data that could be exposed to the agent context.
  • [COMMAND_EXECUTION]: The skill relies on the Bash tool to execute shell commands such as grep, xargs, and curl for loading local configuration and performing network requests. Using shell utilities for these tasks increases the attack surface for potential command-related risks.
  • [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because it ingests untrusted data from an external API. 1. Ingestion points: Data is fetched from SonarCloud API endpoints, including issue descriptions and source code components. 2. Boundary markers: The skill does not utilize explicit delimiters or instructions to ensure that the agent ignores any instructions embedded within the API responses. 3. Capability inventory: The skill has access to the Bash and WebFetch tools. 4. Sanitization: There is no evidence of sanitization, filtering, or validation of the external content before it is processed by the agent.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 15, 2026, 09:59 PM