post-dev-test

Warn

Audited by Gen Agent Trust Hub on Mar 9, 2026

Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill uses the Bash tool to run verification tests. This allows for arbitrary command execution within the environment context using yarn jest.\n
  • Evidence: Phase 5 and the 'Execute Tests' section in SKILL.md show the workflow of using the Bash tool to run test suites.\n- [REMOTE_CODE_EXECUTION]: The skill follows a pattern of dynamic code generation and execution by writing test files to the filesystem and then running them. This represents a dynamic execution risk factor.\n
  • Evidence: SKILL.md Phase 4 ('Write Tests') and Phase 5 ('Execute Verification') document the process of writing new executable scripts and then invoking them.\n- [PROMPT_INJECTION]: The skill has an indirect prompt injection surface because it reads untrusted project data to inform its script generation logic.\n
  • Ingestion points: Phase 2 in SKILL.md reads project files via Read, Grep, and Glob tools to assess coverage gaps.\n
  • Boundary markers: There are no explicit boundary markers or 'ignore' instructions for the data ingested from the source code.\n
  • Capability inventory: The agent has high-privilege capabilities including Write and Bash which could be misused if influenced by malicious content in analyzed files.\n
  • Sanitization: No sanitization is applied to the code content extracted from the project before it is used to generate test files.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 9, 2026, 06:40 AM