coding-standards
Pass
Audited by Gen Agent Trust Hub on Mar 16, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes local commands
yqandphp -lto provide functionality. - The
SessionStarthook usesyqto read.coding_standardsfrom.claude/config.yaml. - The
PostToolUsehook usesphp -lto check the syntax of PHP files after they are edited. - [PROMPT_INJECTION]: The skill has an attack surface for indirect prompt injection because it reads and displays content from project files.
- Ingestion points:
.claude/config.yaml(read byyq) and any PHP file edited (processed byphp -l). - Boundary markers: None present; the skill outputs configuration data directly to the agent's context.
- Capability inventory: The skill has command execution capabilities via hooks defined in
SKILL.md. - Sanitization: No explicit sanitization or instruction-ignoring delimiters are used for the echoed output from
yq.
Audit Metadata