red-team-reporting

Pass

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: SAFE
Full Analysis
  • [Prompt Injection] (SAFE): The documentation (REPORTING-GUIDE.md) and script examples (generate-report.py) contain strings typically used in prompt injection attacks (e.g., 'Ignore previous instructions'). These are clearly labeled as descriptive examples for red team reporting and do not attempt to manipulate the agent's behavior.
  • [Indirect Prompt Injection] (LOW): The ReportGenerator class in scripts/generate-report.py interpolates finding data directly into Markdown output.
  • Ingestion points: Finding IDs, titles, descriptions, and proof-of-concept strings in the Report object.
  • Boundary markers: The Proof of Concept is wrapped in markdown code blocks (```).
  • Capability inventory: The script is limited to string formatting and does not perform file writes, network requests, or command execution.
  • Sanitization: No explicit sanitization or escaping of the input strings is performed before interpolation.
  • [Command Execution] (SAFE): The Python script uses standard libraries and does not invoke os.system, subprocess, or any other shell-executing functions.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 17, 2026, 06:35 PM