code-testing-agent
Pass
Audited by Gen Agent Trust Hub on Apr 22, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it processes untrusted source code as primary input for its analysis phases.
- Ingestion points: The agent reads the user's source code files, configuration files (e.g., .csproj), and project structure to research and plan test generation (SKILL.md, unit-test-generation.prompt.md).
- Boundary markers: Not present; the instructions do not include specific delimiters or directives to ignore instructions that might be embedded in the analyzed codebase.
- Capability inventory: The skill can execute shell commands like
dotnet buildanddotnet testand perform file system operations (SKILL.md, extensions/dotnet.md). - Sanitization: No sanitization or validation of the ingested code content is performed before it is used to influence the agent's logic.
- [COMMAND_EXECUTION]: The skill uses shell commands to interact with the build and test system. It invokes
dotnet build,dotnet test, anddotnet format(extensions/dotnet.md). It also automatically modifies project configuration files (.csproj) to add project references for dependencies it identifies. - [REMOTE_CODE_EXECUTION]: The skill performs dynamic code execution by compiling and running generated unit tests. Running
dotnet buildanddotnet teston an untrusted project carries the risk that malicious code in the project files (e.g., custom MSBuild tasks) or the generated tests could be executed locally.
Audit Metadata