skills/jeremylongshore/claude-code-plugins-plus-skills/optimizing-cache-performance/Gen Agent Trust Hub
optimizing-cache-performance
Pass
Audited by Gen Agent Trust Hub on Apr 10, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTIONNO_CODE
Full Analysis
- [PROMPT_INJECTION]: The trigger phrases specified in the YAML frontmatter ('optimize', 'performance', 'speed up') are extremely common terms. This broad definition increases the risk of the skill being unintentionally triggered by benign user requests or malicious prompts.
- [COMMAND_EXECUTION]: The skill configuration enables the
Bash(cmd:*)tool, allowing arbitrary shell command execution. Without specific constraints or script source code to review, this represents a high-capability toolset that could be abused if the agent is compromised. - [NO_CODE]: The
scripts/directory only contains a README file. The actual Python scripts mentioned (analyze_cache_hit_rate.py,optimize_ttl.py,validate_cache_key_design.py, andgenerate_cache_invalidation_strategy.py) are not present in the skill bundle. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection due to its intended processing of external data.
- Ingestion points:
analyze_cache_hit_rate.pyis described as reading data from logs or metrics endpoints. - Boundary markers: No delimiters or instructions to ignore embedded commands are present in the skill metadata or instructions.
- Capability inventory: The skill has
Writeand unrestrictedBashaccess. - Sanitization: No evidence of sanitization or validation for the log/metrics data is provided.
Audit Metadata