file-utils
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: LOWPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION] (LOW): Indirect Prompt Injection Surface (Category 8). The skill reads external file content from the local system. Evidence: 1. Ingestion points: File contents are processed by count_lines.py, file_stats.py, and compare_files.py. 2. Boundary markers: Absent; there are no explicit delimiters or warnings to ignore embedded instructions in the processed files. 3. Capability inventory: The skill has the ability to read and inspect the local filesystem via scripts and the ls tool. 4. Sanitization: No sanitization of file content is mentioned.
- [COMMAND_EXECUTION] (LOW): The skill instructions involve executing local Python scripts (e.g., python scripts/find_files.py) and allow the use of the Bash ls tool. While this involves command-line execution, it is consistent with the stated purpose of a file utility toolkit and does not demonstrate malicious intent.
Audit Metadata