repair-broken-references
Pass
Audited by Gen Agent Trust Hub on Feb 27, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill relies heavily on bash scripts to perform file system traversal, search for patterns using grep/sed, and verify file existence.
- Evidence includes multiple steps using
find,grep, andrealpathto process project files. - Step 3 executes
Rscript -e "installed.packages()[,'Package']"to inspect the local environment for installed R packages. - [EXTERNAL_DOWNLOADS]: Step 2 implements an external URL checker using
curlto verify the status codes of links found in documentation. - The script iterates through URLs extracted from project files and performs network requests:
curl -o /dev/null -s -w "%{http_code}" "$url". - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it interprets content from the project being analyzed to drive its logic.
- Ingestion points: The skill reads all markdown (
.md), JavaScript/TypeScript (.js,.ts,.jsx,.tsx), Python (.py), and R (.R) files within theproject_pathprovided as input. - Boundary markers: No boundary markers or "ignore instructions" delimiters are used when processing extracted content.
- Capability inventory: The skill is granted
Read,Write,Edit, andBashpermissions, which provide a significant capability set if the agent is misled by malicious content. - Sanitization: There is no evidence of sanitization or validation for the strings extracted from files (links, import paths) before they are passed into shell scripts or used to perform file edits.
Audit Metadata