prowler-test-api
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFECREDENTIALS_UNSAFE
Full Analysis
- [CREDENTIALS_UNSAFE] (LOW): Hardcoded test credentials (e.g.,
TEST_PASSWORD = "testing_psswd"anddev@prowler.com) are present in the documentation filereferences/test-api-docs.md. These are intended for local test environments but constitute hardcoded secrets. - [COMMAND_EXECUTION] (SAFE): The skill provides standard
bashcommands for running thepytestsuite. These commands do not involve privilege escalation, piping remote content to a shell, or obfuscation. - [PROMPT_INJECTION] (SAFE): No patterns of prompt injection, role-play, or safety bypass instructions were found. The 'Critical Rules' are standard coding and testing constraints.
- [DATA_EXFILTRATION] (SAFE): There are no attempts to access sensitive system files (like
~/.sshor~/.aws) or exfiltrate data to unknown domains. The skill specifically warns against using realistic API keys to avoid detection by secret scanners like TruffleHog. - [INDIRECT_PROMPT_INJECTION] (LOW): The skill is designed to ingest and process local project files (API code) and has
BashandWritecapabilities. While this presents an attack surface where malicious code in the project could influence the agent, the risk is inherent to the developer-assistant use case and mitigated by standard LLM guardrails.
Audit Metadata