parallel-ready-django

Warn

Audited by Gen Agent Trust Hub on Mar 10, 2026

Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The analyze-readiness.py script executes local Python code using subprocess.run to verify circular dependencies. This process involves importing modules from the codebase being audited, effectively executing any code contained within those modules.
  • File: references/analyze-readiness.py
  • Evidence: subprocess.run([sys.executable, "-c", f"import sys; sys.setrecursionlimit(100); import {APPS_DIR.replace('/', '.')}"], ...)
  • [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because its core functionality involves reading and analyzing the contents of an external, potentially untrusted repository. Malicious instructions embedded in comments or code within the audited files could influence the agent's output or subsequent actions.
  • Ingestion points: The script reads all Python files (.py) within the specified apps directory.
  • Boundary markers: No explicit delimiters or instructions to ignore embedded commands are used during file reading.
  • Capability inventory: The script can execute subprocesses, write report files to the .claude/ directory, and perform recursive filesystem scans.
  • Sanitization: There is no sanitization or validation of the ingested file content before it is processed by regex patterns or included in logic flows.
  • [COMMAND_EXECUTION]: The skill instructions and associated reference files contain numerous shell commands for managing Django projects, including database migrations, directory creation, and system configuration.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 10, 2026, 06:50 AM