librarian
Pass
Audited by Gen Agent Trust Hub on Mar 18, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill leverages the
opensrc_executetool, which permits the execution of server-side JavaScript for codebase analysis. - Evidence: Documented in
references/opensrc-api.md, specifying that the tool accepts acodeparameter for server-side execution of JavaScript async arrow functions. - [PROMPT_INJECTION]: An indirect prompt injection surface is present because the skill fetches and processes data from external, untrusted repositories.
- Ingestion points: The
opensrc.fetchmethod retrieves code and metadata from GitHub, npm, PyPI, and Crates (documented inSKILL.mdandreferences/opensrc-api.md). - Boundary markers: No specific delimiters or safety instructions are defined to separate untrusted repository content from agent instructions.
- Capability inventory: The
opensrc_executetool provides server-side script execution capabilities (references/opensrc-api.md). - Sanitization: There is no evidence of content sanitization or validation performed on the fetched repository data before processing.
Audit Metadata