qt-coverage-workflow
Pass
Audited by Gen Agent Trust Hub on Mar 18, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION]: The skill implements a workflow where coverage gap data is parsed from project files and passed to a 'test-generator' agent. This creates a risk of indirect prompt injection if project artifacts are compromised.
- Ingestion points:
coverage.json,coverage.info,.qt-test.json, and project configuration files (pyproject.toml,setup.cfg). - Boundary markers: No explicit delimiters are provided in the suggested handoff prompt to separate coverage data from instructions.
- Capability inventory: The downstream 'test-generator' agent is designed to generate source code. The skill's own scripts (
run-coverage.sh) execute system build and test tools. - Sanitization: The extraction logic in
run-coverage.shandreferences/*.mduses basic regex and JSON parsing without sanitization of the content before it is included in prompts. - [COMMAND_EXECUTION]: The skill provides a portable shell script (
templates/run-coverage.sh) and a GitHub Actions template (templates/qt-coverage.yml) that execute potentially dangerous system commands includingcmake,ctest,lcov, andpytestto perform build and instrumentation tasks. - [EXTERNAL_DOWNLOADS]: Documentation and templates provide instructions for installing external dependencies from public registries using
apt-get,dnf,brew, andpip.
Audit Metadata