code-development
Pass
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection as it ingests untrusted data from multiple documentation sources to guide its code generation and command execution.
- Ingestion points: Reads
program-design-{id}.md,task-breakdown-{id}.md, andunit-testing-{id}.mdas specified inSKILL.md. - Boundary markers: None identified in the prompt templates to distinguish between instructions and data.
- Capability inventory: The skill has broad capabilities including
Bash(*),Write, andRead(defined inSKILL.md). - Sanitization: No sanitization or validation of the ingested documentation content is performed before use.
- [COMMAND_EXECUTION]: The skill provides templates for executing arbitrary shell commands via
Bash(*)to run tests and linters. - Evidence:
templates/development-checklist.mdcontains command references for./gradlew test,mvn test,pytest, andnpm test.
Audit Metadata