agent-coder
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (LOW): The
posthook inSKILL.mdautomatically executesnpm run lintif apackage.jsonfile is present in the working directory. This allows for the execution of arbitrary local scripts defined in the project configuration, which could be exploited if the agent operates on a malicious repository. - [PROMPT_INJECTION] (LOW): Detected an indirect prompt injection surface where the agent processes untrusted external data during its lifecycle hooks.
- Ingestion points: The
$TASKenvironment variable in theprehook and thepackage.jsonfile in theposthook. - Boundary markers: Absent; there are no instructions to ignore embedded commands or markers to delimit untrusted content.
- Capability inventory: Shell command execution via
echo,grep, and thenpmpackage runner. - Sanitization: Absent; the skill does not validate the content of the
$TASKvariable or thelintscript withinpackage.jsonbefore execution.
Audit Metadata