configure-justfile
Pass
Audited by Gen Agent Trust Hub on Apr 21, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes dynamic context injection (the
!syntax inSKILL.md) to execute shell commands likefindandpwdat load time. This includes checking for the existence of.envfiles to determine if theJustfileshould be configured with environment variable loading. While this probes for sensitive files, the check is functional for the skill's purpose and restricted to the project root. - [PROMPT_INJECTION]: The skill demonstrates an indirect prompt injection surface as it processes untrusted data from local project files to influence its output and configuration generation.
- Ingestion points: Content is read from
Justfile,Makefile, and project manifest files such aspackage.json,pyproject.toml, andCargo.tomlduring the detection and analysis steps. - Boundary markers: The instructions do not define delimiters or provide warnings to the agent to treat the content from these project files as untrusted or to ignore instructions embedded within them.
- Capability inventory: The skill has access to powerful tools including
Bash,Write, andEdit, which could be manipulated if malicious content in the scanned files influences the agent's logic. - Sanitization: There are no mechanisms described for sanitizing or validating the inputs from external project manifest files before they are used to populate the compliance report or generate new configuration files.
Audit Metadata