architecture-auditor
Pass
Audited by Gen Agent Trust Hub on Mar 9, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill instructs the agent to execute specific shell commands to analyze the project, including
find lib/ -type f -name '*.dart' | head -100for file exploration,grep -r "import.*features/" lib/features/for dependency scanning, andfind lib/ -name "*.dart" -exec wc -l {} +for measuring file sizes. These commands are diagnostic and run within the local project context. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection (Category 8) because it processes user-provided Flutter source code from the
lib/directory andpubspec.yamlas data for analysis. There are no explicit instructions to ignore potentially malicious directions embedded within the code, creating a surface where an attacker could influence the agent's audit results. Mandatory Evidence Chain for Category 8: 1. Ingestion points:lib/directory andpubspec.yaml. 2. Boundary markers: Absent. 3. Capability inventory: Shell command execution viafind,grep, andwc. 4. Sanitization: Absent.
Audit Metadata