ast-grep-find
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: CRITICALCOMMAND_EXECUTIONSAFE
Full Analysis
- [SAFE] (SAFE): No malicious patterns such as prompt injection, obfuscation, or hardcoded credentials were detected in the skill definition.
- [DATA_EXFILTRATION] (SAFE): The automated scanner alert for 'logger.info' is a false positive; the string is used as a replacement pattern in a code example, not as a network destination.
- [COMMAND_EXECUTION] (LOW): The skill executes a local Python script
scripts/ast_grep_find.pyvia Bash. This is standard functionality for this tool, though it requires the wrapper script to safely handle user-supplied search and replacement patterns to prevent command injection. - [INDIRECT_PROMPT_INJECTION] (LOW): The skill is designed to process untrusted codebases, which presents an attack surface. 1. Ingestion points: Local source code files specified by the
--pathand--globparameters. 2. Boundary markers: No explicit separators or instructions to ignore embedded commands are defined. 3. Capability inventory: The skill has the ability to execute Bash commands and Read local files. 4. Sanitization: Relies on the externalast-greputility and the local wrapper script's implementation.
Recommendations
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata