security-scan
Pass
Audited by Gen Agent Trust Hub on May 1, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses a bundled bash script (
scripts/run-scans.sh) to execute several security analysis tools against the local filesystem. - Executed tools include:
gitleaks,semgrep,grype,npm audit,bandit,pip-audit,gosec,govulncheck,cargo audit, andbundle-audit. - [EXTERNAL_DOWNLOADS]: The skill documentation and output provide guidance for installing missing tools from well-known and trusted sources.
- Recommends installation via
brew,pip,npm,go install,cargo install, andgem install. - Explicitly references official repositories for tools like
gosecandgovulncheck. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection (Category 8) because it ingests and reports raw data from external tools that scan potentially untrusted codebases.
- Ingestion points: Tool output is captured in
scripts/run-scans.shvia therun_toolfunction. - Boundary markers: The captured output is wrapped in Markdown code blocks (```) within the generated report, but does not include explicit warnings to ignore embedded instructions.
- Capability inventory: The skill uses the
Bashtool to run the scanning script and process results. - Sanitization: The script does not perform sanitization or filtering of the tool output before it is presented to the agent.
Audit Metadata