c4-code
Pass
Audited by Gen Agent Trust Hub on Feb 19, 2026
Risk Level: SAFEPROMPT_INJECTION
Full Analysis
- [Indirect Prompt Injection] (LOW): The skill possesses a vulnerability surface for indirect prompt injection because its primary function is to parse and document external source code.
- Ingestion points: Source code files within user-specified directories (e.g.,
src/api,utilsmentioned in example interactions). - Boundary markers: Absent. The instructions do not define delimiters or specific warnings to ignore instructions found within the code being analyzed.
- Capability inventory: The skill identifies and documents function signatures and class structures, requiring filesystem read access. No evidence of execution capabilities (exec/eval) or write access was found in the provided file.
- Sanitization: Absent. There are no instructions for the agent to sanitize or escape content found within comments or strings in the source code before including them in the documentation.
- [Data Exposure] (SAFE): The skill focuses on analyzing local code structure. No patterns for credential harvesting or unauthorized network transmission were detected.
- [Remote Code Execution] (SAFE): No remote download patterns or execution of untrusted external scripts (e.g., curl | bash) were found.
- [Obfuscation] (SAFE): No obfuscated content, encoded strings, or suspicious Unicode characters were detected in the skill definition.
Audit Metadata