unit-testing
Pass
Audited by Gen Agent Trust Hub on Mar 4, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill's documentation in SKILL.md and PATTERNS.md suggests using node:child_process.execSync to run local scripts as part of the testing process. While standard for CLI tool testing, this involves spawning subprocesses.
- [PROMPT_INJECTION]: The templates provided for CLI testing are vulnerable to indirect prompt injection (command injection). Untrusted input passed as script arguments could lead to arbitrary command execution on the host system. Ingestion points: The args parameter in the runScript helper function and the filePath parameter in Pattern 1 of PATTERNS.md. Boundary markers: No shell-escaping or boundary markers are used when interpolating arguments into the shell command string. Capability inventory: The skill utilizes execSync which provides full shell access for script execution. Sanitization: The provided examples do not include sanitization, validation, or escaping of input variables before they are executed in the shell.
Audit Metadata