c4-code

Pass

Audited by Gen Agent Trust Hub on Feb 19, 2026

Risk Level: SAFEPROMPT_INJECTION
Full Analysis
  • [Indirect Prompt Injection] (LOW): The skill possesses a vulnerability surface for indirect prompt injection because its primary function is to parse and document external source code.
  • Ingestion points: Source code files within user-specified directories (e.g., src/api, utils mentioned in example interactions).
  • Boundary markers: Absent. The instructions do not define delimiters or specific warnings to ignore instructions found within the code being analyzed.
  • Capability inventory: The skill identifies and documents function signatures and class structures, requiring filesystem read access. No evidence of execution capabilities (exec/eval) or write access was found in the provided file.
  • Sanitization: Absent. There are no instructions for the agent to sanitize or escape content found within comments or strings in the source code before including them in the documentation.
  • [Data Exposure] (SAFE): The skill focuses on analyzing local code structure. No patterns for credential harvesting or unauthorized network transmission were detected.
  • [Remote Code Execution] (SAFE): No remote download patterns or execution of untrusted external scripts (e.g., curl | bash) were found.
  • [Obfuscation] (SAFE): No obfuscated content, encoded strings, or suspicious Unicode characters were detected in the skill definition.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 19, 2026, 04:43 AM