ln-629-lifecycle-auditor

Pass

Audited by Gen Agent Trust Hub on Apr 24, 2026

Risk Level: SAFEEXTERNAL_DOWNLOADSDATA_EXFILTRATIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [EXTERNAL_DOWNLOADS]: Fetches shared reference files, audit methodology, and report templates from the author's public GitHub repository (github.com/levnikolaevich/claude-code-skills) when local resources are missing.
  • [DATA_EXFILTRATION]: Accesses sensitive application entry points and configuration files, including main source files, signal handlers, and deployment manifests (Dockerfile, Kubernetes manifests), to perform lifecycle analysis.
  • [COMMAND_EXECUTION]: Utilizes shell-based tools including Bash and Grep to search for specific code patterns, trace execution paths, and verify resource cleanup logic within the audited codebase.
  • [PROMPT_INJECTION]: Subject to indirect prompt injection risks due to the processing of external codebase data.
  • Ingestion points: Reads application source code and container/orchestration configuration files during the auditing workflow.
  • Boundary markers: No specific delimiters or instructions to ignore embedded commands in the audited files are defined.
  • Capability inventory: Employs Bash, Grep, and Read tools to inspect and process data.
  • Sanitization: No explicit sanitization or validation of the content read from the codebase is specified before processing.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 24, 2026, 07:48 AM