agent-analyze-code-quality
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFE
Full Analysis
- Indirect Prompt Injection (SAFE): The skill ingests untrusted code files (ingestion points in
src/,lib/, etc.) but lacks explicit boundary markers or sanitization. However, its capability set is restricted to read-only tools (Read, Grep, Glob) and WebSearch, with critical tools like Bash and Write explicitly restricted, effectively neutralizing most injection risks. Evidence: 1. Ingestion: project code files; 2. Boundaries: absent; 3. Capabilities: Read, Grep, Glob, WebSearch; 4. Sanitization: absent. - Command Execution (SAFE): The
pre_executionandpost_executionhooks contain shell commands (find,grep,ls). These are used for benign environment discovery (counting files, checking for linting configs) and do not involve remote code or the execution of untrusted external input. - Data Exposure (SAFE): The skill includes a
forbidden_pathsconstraint that prevents the agent from accessing sensitive directories like.gitandnode_modules, protecting against accidental exposure of secrets or repository metadata.
Audit Metadata