code-antipatterns-analysis
Pass
Audited by Gen Agent Trust Hub on Apr 8, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it ingests untrusted source code and provides it to the agent for analysis.\n
- Ingestion points: Source code files are read using
Read,Grep,Bash(sg *), andBash(rg *)tools as described inSKILL.md.\n - Boundary markers: The skill does not define specific delimiters or instructions to ignore instructions embedded within the analyzed code.\n
- Capability inventory: The agent can execute shell commands (
Bash), write todos (TodoWrite), and manage tasks (Task).\n - Sanitization: No validation or sanitization of the input code is performed before analysis.\n- [COMMAND_EXECUTION]: The skill uses shell commands for structural code searching and JSON processing.\n
- Evidence:
SKILL.mdcontains multiple examples ofast-grep,ripgrep, andjqcommand strings intended for execution.
Audit Metadata