generating-unit-tests
Pass
Audited by Gen Agent Trust Hub on Apr 10, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface by processing untrusted source code files.
- Ingestion points: The skill uses
GlobandReadtools to ingest local source files (e.g.,src/utils/parser.ts) to extract logic for test generation. - Boundary markers: The instructions lack delimiters or explicit warnings to the agent to disregard instructions that might be embedded within the source code being analyzed.
- Capability inventory: The agent has the ability to write to the file system (
Write,Edit) and execute shell commands viaBash(test:unit-*)and bundled scripts liketest_runner.sh. - Sanitization: There is no evidence of sanitization, filtering, or validation of the content read from source files before it is used to generate executable test code.
- [COMMAND_EXECUTION]: The skill generates executable code and instructs the agent to run it locally.
- Evidence: The instructions explicitly state to "Run the generated tests to verify they pass" and reference using
npm test,pytest, or the bundledtest_runner.sh. - Risk: If the agent is influenced by malicious content in a source file, it could generate and then execute malicious test code.
Audit Metadata