auto-test-skill

Pass

Audited by Gen Agent Trust Hub on Apr 3, 2026

Risk Level: SAFE
Full Analysis
  • [COMMAND_EXECUTION]: The skill utilizes local Python scripts (create_test_session.py and verify_test_session.py) to manage project directory structures and validate documentation. These scripts perform standard file system operations (creation of directories, reading and writing of markdown files based on templates) and do not execute arbitrary commands or untrusted code.
  • [REMOTE_CODE_EXECUTION]: No remote code execution patterns, such as pipe-to-shell or direct downloads from untrusted sources, were found. The skill relies entirely on local assets and standard Python libraries.
  • [DATA_EXFILTRATION]: There is no evidence of network activity or attempts to exfiltrate sensitive data. Mention of sensitive paths like /etc/passwd or ~/.ssh/ in the documentation is strictly for educational purposes, providing examples of security anti-patterns to look for when auditing other skills.
  • [PROMPT_INJECTION]: The skill includes 'critical thinking' guidelines that encourage the agent to look for edge cases and vulnerabilities in other code. These are legitimate testing methodologies and do not constitute an attempt to bypass the host agent's safety filters.
  • [INDIRECT_PROMPT_INJECTION]: As a tool designed to process and analyze external skill directories, it has an inherent surface for indirect prompt injection if the audited data contains instructions. However, the skill provides boundary markers (templates) and guidelines to mitigate this risk, and the severity is assessed as low as it operates as an analysis tool.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 3, 2026, 04:09 PM