go-development
Pass
Audited by Gen Agent Trust Hub on Mar 7, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The file
modern-go.mdcontains a shell command prefixed with!intended for the agent to execute. This command searches the local filesystem forgo.modfiles to extract the Go version. - Evidence:
!grep -rh "^go " --include="go.mod" . 2>/dev/null | cut -d' ' -f2 | sort | uniq -c | sort -nr | head -1 | xargs | cut -d' ' -f2 | grep . || echo unknown. - [PROMPT_INJECTION]: The automated version detection in
modern-go.mdreads content from user-controlled project files (go.mod) directly into the agent's context. This establishes an indirect prompt injection vector where malicious content in those files could influence agent behavior. - Ingestion points: Local
go.modfiles accessed via thegrepcommand inmodern-go.md. - Boundary markers: None.
- Capability inventory: Shell command execution and Go code generation based on the detected version.
- Sanitization: None.
Audit Metadata