candid-init
Pass
Audited by Gen Agent Trust Hub on Apr 25, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes shell commands including
find,grep,cat,ls, andjqto inspect the local filesystem and extract metadata from project files such aspackage.jsonandtsconfig.json. This behavior is expected given the skill's purpose of codebase auditing. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it reads and processes untrusted data from the user's codebase.
- Ingestion points: Extensive reading of source code files across the repository in Step 5 and Step 6.
- Boundary markers: Absent; the instructions do not use delimiters or provide warnings to the agent to distinguish codebase content from its own instructions.
- Capability inventory: The agent can execute shell commands and write to files (specifically creating
.candid/Technical.mdand.candid/config.json). - Sanitization: None; contents from the analyzed code are processed directly by the agent to synthesize standards.
Audit Metadata