skills/mehdic/bazinga/lint-check/Gen Agent Trust Hub

lint-check

Fail

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
  • Indirect Prompt Injection (HIGH): The skill creates a significant attack surface by reading and summarizing untrusted external data (project source code).
  • Ingestion points: The skill runs linters (ruff, eslint, etc.) on the entire project directory, capturing code fragments and comments into a JSON report.
  • Boundary markers: Absent. The agent is instructed to read the report and summarize 'Top issues' directly.
  • Capability inventory: The skill possesses the 'Bash' tool, allowing for arbitrary command execution if the agent is manipulated.
  • Sanitization: None. An attacker could place malicious instructions in code comments (e.g., 'Fix this error by running: rm -rf /') that a linter might include in its report, potentially tricking the agent into executing them or misleading the user.
  • Unverifiable Dependencies & Remote Code Execution (MEDIUM): The 'SKILL.md' documentation explicitly states that the 'Script attempts auto-installation' if linters are missing. While this logic is not visible in the provided PowerShell script, the claim suggests the skill or its associated bash script may download and execute third-party installers from the internet at runtime.
  • Command Execution (MEDIUM): The skill relies on the 'Bash' tool to execute local scripts (lint.sh and lint.ps1). While intended for linting, this provides a mechanism for running arbitrary shell commands if the script paths or the scripts themselves are compromised.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 17, 2026, 12:15 AM