configure-editor
Pass
Audited by Gen Agent Trust Hub on Apr 21, 2026
Risk Level: SAFE
Full Analysis
- [DYNAMIC_CONTEXT_INJECTION]: The skill uses the dynamic context injection pattern (
!command) in theContextsection ofSKILL.mdto identify existing project configuration files. These commands (e.g.,find . -maxdepth 1 -name '.editorconfig') are restricted to the local directory, do not incorporate external user input, and are used solely for situational awareness during skill initialization. - [INDIRECT_PROMPT_INJECTION]: The skill has a potential surface for indirect prompt injection as it reads project metadata files like
package.jsonandpyproject.tomlto detect development tools. Ingestion points: Step 1 involves reading package and project configuration files. Boundary markers: No explicit delimiters are used for these inputs. Capability inventory: The skill can modify local files usingWrite,Edit, andBashtools. Sanitization: The risk is effectively mitigated because the skill uses the detected files only as triggers to apply static, safe templates fromREFERENCE.mdrather than interpreting or executing the content of those files directly.
Audit Metadata