doc-claim-validator
Pass
Audited by Gen Agent Trust Hub on Feb 24, 2026
Risk Level: SAFEPROMPT_INJECTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface by processing project documentation and source code through AI agents.
- Ingestion points: Markdown files and codebase source files are read by the script and provided to subagents (Dependency, Behavioral, and Code Example verifiers) in Phase 2b.
- Boundary markers: There are no explicit delimiters or instructions provided to the agents to prevent them from following commands embedded within the documentation or code files.
- Capability inventory: The skill uses
Bash,Grep,Glob, andReadtools. - Sanitization: Input for internal shell commands (like grep) is escaped using
re.escape(). - [EXTERNAL_DOWNLOADS]: The
verify_claims.pyscript performs network reachability checks on URLs found in documentation. - Evidence: The
verify_urlfunction usesurllib.request.urlopenwith theHEADmethod to check if external links in the documentation are active. - [COMMAND_EXECUTION]: The skill uses subprocesses to execute system commands for project analysis.
- Evidence:
scripts/verify_claims.pyandscripts/extract_claims.pycallgitandgrepviasubprocess.runto determine project roots and search for code symbols.
Audit Metadata