code-quality-specialist
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (MEDIUM): The sub-skills
code-reviewer,code-archaeologist, andtest-results-analyzerare provided withBashtool access. The instructions specifically guide the agent to run project-specific commands likenpm test,pytest, andgo test. This creates a risk where malicious code in a project's build or test configuration (e.g.,package.jsonscripts) could be executed by the agent. - [REMOTE_CODE_EXECUTION] (MEDIUM): The skill's primary function involves executing code from the external repositories it analyzes. In the context of an untrusted repository, this constitutes a vector for remote code execution within the agent's environment.
- [Indirect Prompt Injection] (LOW): The skill lacks security boundaries when processing external code and logs. An attacker could embed instructions in code comments or metadata to manipulate the agent's analysis or output.
- Ingestion points: Codebase files accessed via
Read,Grep, andLStools (e.g., incore_code-archaeologist.md). - Boundary markers: Absent; no delimiters or warnings to ignore instructions within analyzed files are present in the prompt templates.
- Capability inventory:
Bash,Write,Edit,MultiEdit,NotebookEdit, andTodoWritetools across various sub-agents. - Sanitization: None; the agent processes and interprets raw file content and log data directly.
Audit Metadata