c-verify-skill
Pass
Audited by Gen Agent Trust Hub on Mar 13, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill presents a surface for indirect prompt injection as it processes external C/C++ source code and feeds the diagnostic messages to the agent. While the script performs escaping to maintain JSON integrity, it does not filter the natural language content of the tool outputs.
- Ingestion points: C/C++ source files analyzed by
clang-tidyandcppcheckinscripts/run_c_checks.sh. - Boundary markers: Analysis results are returned as structured JSON data as described in
README.mdandSKILL.md. - Capability inventory: The skill is authorized to use
Bash,Read,Write,Edit,Glob, andGreptools. - Sanitization: The
run_c_checks.shscript escapes backslashes and double quotes in the message fields to prevent JSON syntax breakage. - [COMMAND_EXECUTION]: The bash script
run_c_checks.shutilizes variable expansion to construct shell commands forclang-tidy. In therun_clang_tidyfunction, the$filevariable is appended to the command string without surrounding quotes (cmd="$cmd $file"), which could potentially lead to shell injection if a file name containing shell metacharacters is processed. However, since the files are sourced from local discovery viagitorfind, the risk is considered limited to the local environment.
Audit Metadata