sonarqube-new-code-warning-fixer
Pass
Audited by Gen Agent Trust Hub on Mar 4, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes a local Python script
scripts/list_newly_updated_files.pyto identify updated files usingsubprocess.runfor Git commands. Additionally, the skill's workflow instructs the agent to execute project-specific test commands to validate fixes, which constitutes dynamic command execution based on repository context.\n- [PROMPT_INJECTION]: The skill processes external data from SonarQube issue messages and security hotspot descriptions, creating a surface for indirect prompt injection where malicious instructions could be embedded in the code quality reports.\n - Ingestion points: Data retrieved from SonarQube via MCP tools
mcp__sonarqube__search_sonar_issues_in_projectsandmcp__sonarqube__search_security_hotspots.\n - Boundary markers: Absent; the instructions do not include specific delimiters or warnings to treat the retrieved tool data as untrusted.\n
- Capability inventory: Execution of local scripts, modification of project source code, and execution of shell commands for testing purposes.\n
- Sanitization: No sanitization or validation of the SonarQube issue content is performed prior to the agent's remediation actions.
Audit Metadata