project-context-migration
Pass
Audited by Gen Agent Trust Hub on Mar 16, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Uses the
rg(ripgrep) utility to inventory files within specific local documentation directories. - [COMMAND_EXECUTION]: Executes a validation script located at
../project-context/scripts/check_runtime_shape.pyto verify the structure of the migrated repository. - [PROMPT_INJECTION]: Exhibits an indirect prompt injection surface by ingesting and reorganizing untrusted legacy documentation for agent consumption.
- Ingestion points: Reads files from
docs/,notes/,adr/,runbooks/,plans/,tasks/, and.ai/(SKILL.md). - Boundary markers: Absent; the instructions do not define delimiters to isolate untrusted source content.
- Capability inventory: Filesystem read/write permissions, execution of the
rgbinary, and execution of a local Python script. - Sanitization: Absent; documents are migrated without content validation or escaping.
Audit Metadata