peach-team-refactor
Pass
Audited by Gen Agent Trust Hub on Apr 12, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill reads source code and injects it into the prompts of sub-agents as context, creating an indirect prompt injection surface. \n
- Ingestion points:
SKILL.md(Section 1.5) reads target module files usingcat api/src/modules/[module]/**/*.tsandcat front/src/modules/[module]/**/*.{vue,ts}.\n - Boundary markers: Absent; the orchestrator does not use delimiters or provide explicit instructions to sub-agents to ignore instructions embedded in the source code.\n
- Capability inventory:
references/refactor-backend-agent.mdandreferences/refactor-frontend-agent.mddefine agents withEdit,Write,Task, andBashtools, allowing them to modify the local environment.\n - Sanitization: No sanitization or filtering is performed on the ingested code before it is passed to sub-agents.\n- [COMMAND_EXECUTION]: The skill executes shell commands to verify the local environment and run build processes.\n
- Reads
~/.claude/settings.jsonto check for theCLAUDE_CODE_EXPERIMENTAL_AGENT_TEAMSflag, which involves accessing configuration files outside the project scope.\n - Executes project-defined scripts such as
bun test,bun run build, andbunx vue-tscwhich depend on the local project'spackage.jsonconfiguration.
Audit Metadata