sonarqube-new-code-warning-fixer

Pass

Audited by Gen Agent Trust Hub on Mar 4, 2026

Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill executes a local Python script scripts/list_newly_updated_files.py to identify updated files using subprocess.run for Git commands. Additionally, the skill's workflow instructs the agent to execute project-specific test commands to validate fixes, which constitutes dynamic command execution based on repository context.\n- [PROMPT_INJECTION]: The skill processes external data from SonarQube issue messages and security hotspot descriptions, creating a surface for indirect prompt injection where malicious instructions could be embedded in the code quality reports.\n
  • Ingestion points: Data retrieved from SonarQube via MCP tools mcp__sonarqube__search_sonar_issues_in_projects and mcp__sonarqube__search_security_hotspots.\n
  • Boundary markers: Absent; the instructions do not include specific delimiters or warnings to treat the retrieved tool data as untrusted.\n
  • Capability inventory: Execution of local scripts, modification of project source code, and execution of shell commands for testing purposes.\n
  • Sanitization: No sanitization or validation of the SonarQube issue content is performed prior to the agent's remediation actions.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 4, 2026, 11:09 PM