graphicode-junior-engineer-ts-state-bun
Pass
Audited by Gen Agent Trust Hub on Mar 14, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTIONREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses shell commands to interact with the project's file system, which could be abused if path variables are not properly constrained.
- Evidence: Uses
cat ./<stateDir>/<stateId>/README.mdto read files andecho '...' > ./<stateDir>/<stateId>/index.tsto write code. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it reads and processes external README files to generate executable code.
- Ingestion points: Reads content from
README.mdfiles specified by user-provided IDs inSKILL.md. - Boundary markers: No explicit delimiters or instructions are provided to the model to ignore malicious instructions embedded within the README files.
- Capability inventory: The skill can read/write to the filesystem and generate code with access to Bun's system-level APIs.
- Sanitization: There is no evidence of sanitization or validation of the README content before it is used to influence code generation.
- [REMOTE_CODE_EXECUTION]: The generated code has access to powerful environment capabilities that could be exploited if the code generation logic is subverted.
- Evidence:
references/bun.mdidentifies that the generated code may useBun.spawn,Bun.serve,fetch, andbun:ffi, allowing for process execution and network operations.
Audit Metadata