graphicode-junior-engineer-ts-state-umi
Pass
Audited by Gen Agent Trust Hub on Mar 9, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill employs
catandechoshell commands to read documentation and write TypeScript files. While the instructions define a project-specific directory structure, the absence of strict path validation allows for potential path traversal if the agent is directed to access or overwrite sensitive files outside the intended scope. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it is explicitly instructed to follow the implementation details found in external
README.mdfiles. Malicious content in these files could influence the agent to generate harmful code or perform unintended actions. - Ingestion points: Documentation files are ingested using the
catcommand inSKILL.mdbased on user-provided IDs. - Boundary markers: No delimiters or instructions are provided to the agent to distinguish between data and potentially malicious instructions within the documentation files.
- Capability inventory: The agent has the capability to modify the project workspace using the
echocommand as described inSKILL.md. - Sanitization: There is no evidence of sanitization or validation of the content read from external documentation files before it is used to guide code generation.
Audit Metadata