analyze
Pass
Audited by Gen Agent Trust Hub on Apr 26, 2026
Risk Level: SAFE
Full Analysis
- [COMMAND_EXECUTION]: The skill provides clear instructions on how to use the
Bashtool safely. It specifically mandates the use of double-quoting and the--separator forgrepand other commands to prevent command injection vulnerabilities, citing CWE-78. - [REMOTE_CODE_EXECUTION]: The analysis of
scripts/analyze.pyshows it is a pure Python script using standard libraries (argparse,sys). It functions as a state machine to generate instructional prompts and does not contain any functions for executing arbitrary code, downloading remote scripts, or installing external packages. - [DATA_EXFILTRATION]: The skill does not contain any hardcoded credentials, sensitive file paths (like SSH keys or environment secrets), or network-related commands (
curl,wget,socket) that could be used to exfiltrate data. Its use of theReadtool is within the expected scope of a codebase analysis utility. - [PROMPT_INJECTION]: The instructions in
SKILL.mdand the prompts generated byscripts/analyze.pyare strictly procedural and methodological. There are no attempts to bypass safety filters or override system instructions. The structured phases (Exploration, Planning, Verification, Synthesis) serve as a functional framework rather than a deceptive mechanism. - [EXTERNAL_DOWNLOADS]: The skill does not reference or attempt to download any external resources or dependencies from untrusted sources. All referenced materials in the
references/directory are local markdown files containing architectural and design patterns.
Audit Metadata