Testing Code
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFENO_CODE
Full Analysis
- [Prompt Injection] (SAFE): No patterns were found that attempt to override system instructions or bypass safety filters.
- [Data Exposure & Exfiltration] (SAFE): No hardcoded credentials or access to sensitive local file paths (e.g., ~/.ssh) were detected. Code examples utilize standard placeholders and mock data.
- [Remote Code Execution] (SAFE): The skill does not contain any remote code execution patterns, such as piping curl to a shell. It only describes the use of local test runners like npm or pytest.
- [Indirect Prompt Injection] (SAFE): The skill defines a surface for processing project documentation, but no malicious instructions are present in the provided content. Evidence Chain: 1. Ingestion points: docs/user-stories, docs/feature-spec, docs/api-contracts.yaml. 2. Boundary markers: Absent. 3. Capability inventory: File system read/write and local test command execution. 4. Sanitization: Absent.
Audit Metadata