refactor
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [Indirect Prompt Injection] (HIGH): The skill is highly vulnerable to malicious instructions embedded within the code provided for refactoring.
- Ingestion points: The
[TARGET_CODE]variable is interpolated directly into the prompts for five separate agents (phoenix,plan-agent,kraken,plan-reviewer,arbiter). - Boundary markers: There are no boundary markers or instructions telling the agents to ignore commands contained within the
[TARGET_CODE]block. - Capability inventory: The
krakenagent is authorized to write code changes to the filesystem. Thearbiteragent is authorized to execute commands to run test suites and linters. - Sanitization: No sanitization or validation of the input code is performed before it is processed by the LLM.
- [Command Execution] (MEDIUM): The
arbiteragent's role is to 'Run full test suite' and 'Run linting'. This provides a direct path for arbitrary command execution on the host system. If a previous stage (likekraken) is compromised via injection to write a malicious test file, thearbiterwill execute that malicious code during the validation phase.
Recommendations
- AI detected serious security threats
Audit Metadata