stack-review
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- Indirect Prompt Injection (HIGH): The skill processes untrusted external data (source code) that could contain malicious instructions designed to subvert the agent's auditing logic.
- Ingestion points: Files read via
Read,rg(ripgrep), andGlobtools. - Boundary markers: Absent. There are no instructions or delimiters defined to prevent the agent from following instructions found within the audited code.
- Capability inventory: The skill uses
Bash(rg *)andRead. WhileBashis limited torgin the configuration, a compromised agent could attempt to bypass constraints or useReadto disclose sensitive file contents. - Sanitization: None. The agent directly analyzes raw file content without sanitization or filtering.
- Command Execution (MEDIUM): The skill relies on executing shell commands (
rg) viaBash. This creates a risk of command injection if the agent framework does not properly sanitize inputs passed to the shell. - Automated Scan Results (INFO): The automated scan flagged
logger.infoandctx.logger.infoas malicious URLs. These are confirmed as false positives; the scanner misinterpreted TypeScript method calls using the.infoTop-Level Domain (TLD) as URLs.
Recommendations
- AI detected serious security threats
- Contains 2 malicious URL(s) - DO NOT USE
Audit Metadata