jetbrains-skill
Warn
Audited by Gen Agent Trust Hub on Apr 7, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill provides the
execute_terminal_commandtool, which allows for the execution of arbitrary shell commands within the IDE's integrated terminal. This is a high-risk capability that could be used for system modification or malicious activity if misused. Evidence found inSKILL.mdandreferences/jetbrains-skill.md. - [REMOTE_CODE_EXECUTION]: Through the
execute_run_configurationtool, the agent can trigger the execution of any predefined or dynamic code execution task configured within the JetBrains IDE. Evidence found inSKILL.mdandreferences/jetbrains-skill.md. - [DATA_EXFILTRATION]: The skill features tools to read any file within the project scope (
get_file_text_by_path). When combined with the terminal execution capability, this creates a potential vector for exfiltrating project secrets or source code. Evidence: tool definitions inreferences/jetbrains-skill.md. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it ingests and processes untrusted data from project files. 1. Ingestion points:
get_file_text_by_path,search_in_files_by_text, andsearch_in_files_by_regex. 2. Boundary markers: None specified in the instructions for the agent to use when handling file content. 3. Capability inventory: Terminal execution (execute_terminal_command), run configuration execution (execute_run_configuration), and file writing (create_new_file,replace_text_in_file). 4. Sanitization: No sanitization or validation of the ingested content is described before it enters the agent's context.
Audit Metadata