ln-626-dead-code-auditor
Pass
Audited by Gen Agent Trust Hub on Apr 25, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: Vulnerable to indirect prompt injection (Category 8) as it processes untrusted codebase files.
- Ingestion points: Reads source code and project configuration files via
Read,Grep,Glob, and MCP tools. - Boundary markers: Not specified to distinguish untrusted code content from agent instructions.
- Capability inventory: Includes
Bashfor command execution,Readfor file access, andWritefor generating markdown reports. - Sanitization: No explicit evidence of sanitization or filtering of codebase content prior to processing.
- [EXTERNAL_DOWNLOADS]: Downloads shared reference files and report templates from the author's official GitHub repository (
levnikolaevich/claude-code-skills) when local files are missing. - [COMMAND_EXECUTION]: Utilizes the
Bashtool to run static analysis tools, linters, and search patterns for code auditing purposes.
Audit Metadata