codebase-navigation
Pass
Audited by Gen Agent Trust Hub on Mar 5, 2026
Risk Level: SAFEPROMPT_INJECTIONDATA_EXFILTRATION
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection (Category 8).
- Ingestion points: The agent is instructed to read potentially attacker-controlled files such as
README.md,CLAUDE.md, and various source code files across the repository (e.g.,SKILL.mdStep 1,examples/exploration-patterns.mdExample 1). - Boundary markers: There are no explicit instructions to use delimiters or to disregard natural language instructions found within the files being analyzed.
- Capability inventory: The skill utilizes
ls,grep,glob, andreadcapabilities to process and retrieve file contents. - Sanitization: No sanitization or validation logic is defined to protect against malicious instructions embedded in the codebase being navigated.
- [DATA_EXFILTRATION]: The skill includes instructions to locate sensitive file paths and environment configurations.
- Evidence: In
SKILL.md, underStep3_ConfigurationDiscovery, it usesglob: **/{.env*,docker-compose*,Dockerfile}to identify environment files that often contain secrets. - Evidence: Under
FindConfiguration, it usesgrep: (process\.env|os\.environ|env\.)to locate where environment variables are accessed, which can expose sensitive configuration keys.
Audit Metadata