fork-discipline
Pass
Audited by Gen Agent Trust Hub on May 14, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes shell commands to audit and modify the local codebase.
- Evidence: Commands include
grep,find,git mv, andmkdirused to search for client-specific identifiers and move files into a structuredclients/directory. - Dynamic Scripting: The skill generates a shell script at
.jez/scripts/fork-refactor.shbased on audit results to automate refactoring, which involves writing and potentially executing locally generated code. - [PROMPT_INJECTION]: The skill possesses an indirect prompt injection surface due to its handling of untrusted codebase data.
- Ingestion points: Project source files (e.g.,
src/*.ts) and configuration files are scanned and read viagrepandReadtools. - Boundary markers: None. The instructions do not define delimiters or provide warnings to the agent to ignore instructions contained within the analyzed source code.
- Capability inventory: The skill is authorized to use
Bashfor command execution,Writefor file creation, andEditfor code modifications. - Sanitization: None. Data retrieved from the codebase is directly used to populate the
fork-discipline-audit.mdreport and the generatedfork-refactor.shshell script. - [SAFE]: The tool is a legitimate developer utility aimed at improving code architecture. All operations are local to the workspace, and no external network activity or unauthorized data access was detected.
Audit Metadata