fuzzy-selecting
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION] (SAFE): The skill provides extensive examples of using
fzfin conjunction with other tools likekill,vim, andgit. These are standard developer and system administrator workflows. Whilefzfsupports arbitrary command execution via--previewand--bindflags, the usage documented here is for legitimate interactive selection purposes. - [INDIRECT_PROMPT_INJECTION] (SAFE): The skill acts as an interface for processing arbitrary list data from STDIN or the file system. While this constitutes an attack surface if an agent interprets data as instructions, the skill does not include any malicious triggers.
- Ingestion points: STDIN, File System, and output from discovery tools like
fdorps(SKILL.md, fzf-guide.md). - Boundary markers: Absent. The skill does not specify delimiters for separating data from instructions.
- Capability inventory:
kill,rm,vim,npm uninstall,eval, andgit(reference/fzf-guide.md). - Sanitization: Absent. Input is typically passed directly to subsequent commands.
Audit Metadata