configure-integration-tests
Pass
Audited by Gen Agent Trust Hub on Apr 21, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses dynamic context injection via the
!command`` syntax inSKILL.mdto execute shell commands likepwd,find, andgrepat load time. These commands are used for project introspection to automatically detect the language, framework, and existing test configuration. - [EXTERNAL_DOWNLOADS]: The skill automates the installation of standard testing dependencies including
supertest,testcontainers, andhttpxusing package managers likebunanduv. These are well-known libraries from official registries. - [COMMAND_EXECUTION]: It provides instructions to modify and create GitHub Actions workflow files (
.github/workflows/test.yml) to integrate testing jobs with service containers (PostgreSQL, Redis). - [PROMPT_INJECTION]: The skill possesses a surface for indirect prompt injection as it ingests and acts upon data from untrusted project manifest files.
- Ingestion points: Project configuration files such as
package.json,pyproject.toml, and.project-standards.yamlare read to analyze the testing state. - Boundary markers: No delimiters or warnings are provided to prevent the agent from obeying instructions potentially embedded in these ingested files.
- Capability inventory: The skill is capable of modifying project files and executing shell commands (
Bash), which could be misdirected by a malicious project manifest. - Sanitization: There is no evidence of sanitization or content validation before these files influence the agent's logic.
Audit Metadata