extract-fuzzer-repro
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [Indirect Prompt Injection] (LOW): The skill processes untrusted data from external logs which could contain malicious instructions or malformed code designed to exploit the agent or local compiler.
- Ingestion points: GitHub Action logs fetched via
gh apiand stored infuzzer_logs.txt(File: SKILL.md). - Boundary markers: Absent. There are no delimiters or instructions to treat the log content as non-executable text.
- Capability inventory: The skill uses the
Bashtool to runnargoand theWritetool to createsrc/main.nrandProver.toml(File: SKILL.md). - Sanitization: Absent. The agent is directed to copy sections directly from logs into the local environment.
- [Command Execution] (LOW): The skill invokes
nargo executeon code extracted from fuzzer logs. This behavior is the primary intended purpose of the skill for developers, though it involves running unverified code. - [External Downloads] (LOW): Performs network operations via
gh apito fetch logs from thenoir-lang/noirrepository. Since the organization is not on the trusted list, this is flagged as a low-severity network operation.
Audit Metadata