api-testing
Pass
Audited by Gen Agent Trust Hub on Apr 23, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill contains several Python scripts in the
scripts/directory that usesubprocess.callto chain execution between local utility scripts for file conversion and parsing.\n - Evidence: Found in
scripts/convert_to_csv.py,scripts/parse_excel.py,scripts/batch_convert_templates.py, and other similar wrapper scripts.\n - Context: These operations are part of the skill's core functionality for managing QA output formats. The scripts use
sys.executableand normalized paths, avoiding shell execution and remote code invocation.\n- [PROMPT_INJECTION]: The skill's primary function involves processing external documentation and requirements, which presents a surface for indirect prompt injection.\n - Ingestion points:
prompts/api-testing.mdinstructs the agent to process materials such as OpenAPI/Swagger docs, Postman collections, and WSDL files.\n - Boundary markers: Absent. There are no explicit delimiters or safety instructions provided to the agent to distinguish between user instructions and external data content.\n
- Capability inventory: The skill has the capability to read and write files and execute local processing scripts within its directory.\n
- Sanitization: Absent. The provided scripts perform format parsing and conversion without explicit sanitization of the input text content.
Audit Metadata