gsp-audit
Pass
Audited by Gen Agent Trust Hub on Mar 23, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes a local shell script located at
dev/scripts/audit-tests.shusing theBashtool. It passes user-supplied$ARGUMENTSdirectly to this script to filter test execution (e.g., 'contracts', 'versions'). - [COMMAND_EXECUTION]: The skill uses
node -eto programmatically extract and compare version strings frompackage.jsonand.claude-plugin/plugin.json. It also usesnode -cto perform syntax validation onbin/install.js. - [INDIRECT_PROMPT_INJECTION]: The skill possesses an indirect prompt injection surface as it ingests data from external files (skills and agents) and has significant system capabilities (Bash, Node.js).
- Ingestion points: Reads content from all files within
gsp/skills/andgsp/agents/during contract and installer checks. - Boundary markers: No specific delimiters or 'ignore' instructions are used when reading these files; however, the agent is instructed to use specific tools like
grepandcatfor targeted extraction rather than open-ended reasoning on the file content. - Capability inventory: The skill can execute arbitrary shell commands via
Bashand run Node.js code, which are used for testing and version verification. - Sanitization: No explicit sanitization of the file content is performed before processing, though the logic relies on pattern matching for specific frontmatter fields and references.
Audit Metadata