code-quality
Pass
Audited by Gen Agent Trust Hub on Apr 21, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill instructs the agent to execute shell and Elixir scripts from a specific local directory (
~/.claude/scripts/elixir-phoenix-guide/). This includesrun_analysis.shfor full project scans andcode_quality.exsfor targeted file analysis. These commands are integral to the skill's primary function of code auditing. - [PROMPT_INJECTION]: The skill possesses a vulnerability surface for indirect prompt injection (Category 8) because it processes potentially untrusted source code and provides analysis results back to the agent context.
- Ingestion points: External source files defined by file patterns
**/*.exand**/*.heex(SKILL.md). - Boundary markers: Absent; there are no specific instructions to use delimiters or to disregard embedded natural language instructions within the code files being analyzed.
- Capability inventory: The skill allows for local command execution via
bashandelixirscripts (SKILL.md) which process the content of the ingested files. - Sanitization: No sanitization or validation of the source code content is performed before analysis or before reporting results to the agent.
Audit Metadata