treatment-plans
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [Privilege Escalation] (SAFE): The documentation in
assets/STYLING_QUICK_REFERENCE.mdprovides instructions for a human user to runsudo tlmgrto install LaTeX packages. This is a standard administrative task and is not executed autonomously by the agent code.\n- [Data Exposure & Exfiltration] (SAFE): No hardcoded credentials, sensitive file access, or network operations were identified. The Python scripts perform local file operations for template copying and content validation only.\n- [Dynamic Execution] (SAFE): The provided Python scripts do not use dynamic code execution functions likeeval()orexec(), nor do they spawn subprocesses. All logic is static and focused on string matching and file management.\n- [Indirect Prompt Injection] (LOW): Thescripts/check_completeness.pyscript ingests user-provided.texfiles for validation, which constitutes a data ingestion surface.\n - Ingestion points: The script reads file contents via the
read_filefunction (line 156 inscripts/check_completeness.py).\n - Boundary markers: None are present to separate the analyzed text from potential embedded instructions.\n
- Capability inventory: The skill has file system read/write capabilities but lacks network access or the ability to execute system commands.\n
- Sanitization: The input is analyzed using regular expressions for pattern matching; the content is never interpreted as code or executable instructions.
Audit Metadata