project-analyzer

Pass

Audited by Gen Agent Trust Hub on Apr 23, 2026

Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface as it is designed to ingest and analyze data from untrusted external codebases.
  • Ingestion points: The skill reads various manifest files (package.json, requirements.txt, etc.) and source code files from the user's project directory.
  • Capability inventory: The skill has access to Bash and file system tools (Read, Glob, Grep) and can execute local analysis scripts.
  • Boundary markers: No explicit delimiters or warnings to ignore instructions embedded in the analyzed code were identified in the instructions.
  • Sanitization: There is no evidence of content sanitization before the agent processes the file data for its analysis report.
  • [COMMAND_EXECUTION]: The skill utilizes shell commands to facilitate project analysis and interact with development environments.
  • Execution of core logic: The main entry point (main.cjs) spawns a Node.js process to run the analyzer.mjs script located in the skill's tool directory.
  • External tool invocation: The skill's instructions suggest running standard ecosystem tools such as npm audit, npm outdated, or local linters (ESLint, Ruff) to assess project health.
  • Argument passing: Command-line arguments are passed from the agent to the underlying analyzer script using an array-based spawn method.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 23, 2026, 05:32 PM