autonomous-coding-agent
Pass
Audited by Gen Agent Trust Hub on Feb 26, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill executes the
claudeCLI viachild_process.spawnto perform automated coding tasks. - [PROMPT_INJECTION]: Vulnerable to Indirect Prompt Injection (Category 8).
- Ingestion points: Untrusted data enters the agent context through the
promptargument in thecodex_executetool and thegithub.event.issue.bodyin the GitHub Actions example. - Boundary markers: No boundary markers or protective instructions are present to separate system instructions from untrusted user content.
- Capability inventory: The invoked
claudeCLI has extensive capabilities, including file system access and shell command execution. - Sanitization: The implementation includes
sanitizePrompt, but it only filters shell metacharacters (` and $) and does not sanitize the natural language content for malicious instructions. - [EXTERNAL_DOWNLOADS]: The skill uses the
@modelcontextprotocol/sdkNode.js package, which is a well-known service from Model Context Protocol.
Audit Metadata