sast-configuration
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [Indirect Prompt Injection] (HIGH): The skill is designed to ingest and analyze untrusted application code. It lacks boundary markers or sanitization instructions to prevent the agent from obeying malicious instructions embedded in the code being scanned (e.g., in comments or config files). (Ingestion: Application code; Boundary: Absent; Capabilities: Subprocess execution, Docker, Pip; Sanitization: Absent).
- [Unverifiable Dependencies] (MEDIUM): The skill references and executes a local file
./scripts/run-sast.shwhich was not provided in the analyzed file set, preventing verification of its command logic. - [Command Execution] (MEDIUM): The instructions require the agent to execute system-altering commands including
pip install,docker run, andgh extension install. - [Trusted Sources] (INFO): References to the
github/gh-codeqlextension are from a trusted organization, which downgrades the download risk for that specific component but does not offset the execution risks.
Recommendations
- AI detected serious security threats
Audit Metadata