analyzing-test-coverage
Warn
Audited by Gen Agent Trust Hub on Mar 12, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/generate_report.pyscript implements agenerate_scriptmethod that dynamically writes a bash script to the disk and usesfile_path.chmod(0o755)to make it executable. This represents a security risk because the content of the generated script is derived from thetemplateargument, which can be influenced by user-provided input or external configuration, potentially allowing for arbitrary command execution. - [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface with the following characteristics:
- Ingestion points: Reads configuration files from
{baseDir}/config/and processes project source code and coverage data inscripts/analyze_coverage.pyandscripts/find_untested_code.py. - Boundary markers: No boundary markers or specific 'ignore' instructions are present to delimit untrusted data from the agent's instructions.
- Capability inventory: The skill has permissions to write files, execute bash commands via the
Bash(test:coverage-*)tool, and generate executable shell scripts. - Sanitization: There is no evidence of sanitization, validation, or escaping of the content ingested from the external project files or configurations before it is used in the workflow.
Audit Metadata