moai-workflow-testing
Pass
Audited by Gen Agent Trust Hub on Apr 30, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill makes extensive use of the Python
subprocessmodule and shell tools to execute various development utilities such aspytest,git,pylint,flake8,bandit, andmypy. These operations are consistent with its stated purpose of managing test cycles and performing code quality analysis. - [EXTERNAL_DOWNLOADS]: At runtime, the skill fetches documentation, security patterns, and best practices from an external 'Context7' MCP service. It also utilizes well-known dependencies such as Playwright and various Python analysis libraries.
- [PROMPT_INJECTION]: The skill presents an attack surface for indirect prompt injection because it is designed to ingest and parse untrusted project files and git metadata (ingestion points in
modules/code-review/core-classes.mdandmodules/refactoring/ai-workflows.md). Malicious code or comments within these analyzed files could potentially manipulate the AI agent's logic during test generation or command execution (capabilities inmodules/static-analysis.md). The implementation lacks explicit data boundary markers or sanitization for these workflows.
Audit Metadata