refactoring-patterns
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHPROMPT_INJECTION
Full Analysis
- [Prompt Injection] (SAFE): No direct instructions to bypass security or override behavior were found.\n- [Data Exposure & Exfiltration] (SAFE): No sensitive data access or exfiltration patterns detected.\n- [Obfuscation] (SAFE): No use of hidden characters or multi-layer encoding identified.\n- [Indirect Prompt Injection] (HIGH): The skill identifies 'src/services/' as an ingestion point for external source code used by modification agents. This creates a high-risk surface for indirect prompt injection.\n
- 1. Ingestion points: Source files from 'src/services/' analyzed by 'qe-quality-analyzer'.\n
- 2. Boundary markers: Absent; no delimiters are defined to separate the code from agent instructions.\n
- 3. Capability inventory: Includes 'qe-test-refactorer' for automated file modifications and 'npm test' for code execution.\n
- 4. Sanitization: None identified in the workflow or task definitions.
Recommendations
- AI detected serious security threats
Audit Metadata