atomic-design-system-auditor
Pass
Audited by Gen Agent Trust Hub on Mar 9, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection through the analysis of untrusted Flutter/Dart source code.
- Ingestion points: Reads files within the
lib/directory andpubspec.yamlusing shell utilities likegrepandfindvia the workflow steps inSKILL.md. - Boundary markers: The skill lacks explicit instructions or delimiters for the agent to ignore instructions embedded within the source code being analyzed.
- Capability inventory: The skill uses local read-only commands (
find,grep,wc). It does not have network access or file-write permissions. - Sanitization: Content extracted from the audited codebase is not sanitized or escaped before being processed by the agent.
- [COMMAND_EXECUTION]: The skill workflow relies on the agent executing shell commands (
find,grep,wc) to perform the audit. While these are local and intended for read-only analysis, they constitute a primary operational capability of the skill. - [SAFE]: The skill operates entirely locally and does not perform any network requests, external data transfers, or sensitive file access (e.g., SSH keys or environment variables) outside of the intended project scope.
- [SAFE]: No hardcoded credentials, persistence mechanisms, or obfuscated code patterns were detected in the skill files.
Audit Metadata