csharp-style-guide
Pass
Audited by Gen Agent Trust Hub on Feb 28, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill instructs the agent to run various shell commands, including local scripts and standard development tools, which take user-provided file paths as arguments.
- Evidence:
SKILL.mddirects the agent to executepython3 scripts/resolve_style_guides.py <changed-path>...andpython3 scripts/validate_trigger_matrix_sync.py. - Evidence:
references/quality-gate-command-matrix.mdcontains a matrix of commands for tools likedotnet,ruff,cargo,sqlfluff, andterraformto be run by the agent. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because its primary function is to ingest and process untrusted code and configuration files.
- Ingestion points: Files matching patterns in
references/trigger-matrix.md(e.g.,.cs,.sh,.py,.js,.tf,.sql) are loaded into the agent's context. - Boundary markers: Absent. There are no instructions to use delimiters or ignore instructions embedded within the analyzed files.
- Capability inventory: The skill has shell execution capabilities (
dotnet,python3, etc.) which could be exploited if an attacker injects malicious instructions into the code being reviewed. - Sanitization: Absent. The skill does not mention any validation or escaping of the content of the files before they are processed by the LLM.
Audit Metadata