skills/jeremylongshore/claude-code-plugins-plus-skills/performing-security-code-review/Gen Agent Trust Hub
performing-security-code-review
Pass
Audited by Gen Agent Trust Hub on Apr 8, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: Indirect Prompt Injection Surface. The skill is designed to ingest and analyze potentially untrusted project source code, creating an entry point for indirect prompt injection.
- Ingestion points: Target source files, environment configurations, and dependency manifests are read into the agent's context using the
Read,Glob, andGreptools as instructed inSKILL.md. - Boundary markers: The instructions do not define clear delimiters or "ignore embedded instructions" warnings to separate user-provided code from the agent's system instructions.
- Capability inventory: The skill utilizes the
Bash,Write, andEdittools, which provide the agent with broad execution and modification capabilities over the local environment (SKILL.md). - Sanitization: There is no evidence of sanitization or escaping mechanisms applied to the file content before it is processed by the AI.
- [COMMAND_EXECUTION]: Intentional vulnerability examples. The file
assets/example_code_vulnerable.pycontains thecommand_injection_examplefunction, which usessubprocess.run(shell=True)with unsanitized user input. This is explicitly provided as a negative pattern for the code review tool to identify. - [REMOTE_CODE_EXECUTION]: Intentional insecure deserialization. The asset file
assets/example_code_vulnerable.pydemonstrates remote code execution usingpickle.loads(). It includes aMaliciousClassdesigned to executerm -rf /upon deserialization, serving as a test case for auditing capabilities.
Audit Metadata