repair-artifacts
Pass
Audited by Gen Agent Trust Hub on Apr 18, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses
subprocess.runinlib/workflow_state/parity.pyto executenpx skills ls -g --json. This command identifies installed skills to verify parity with the repository. It uses a predefined list of arguments and does not involve a shell or untrusted input. - [PROMPT_INJECTION]: The skill represents an indirect prompt injection surface because it reads and parses user-controlled artifacts such as
README.mdand metadata files to rebuild registries. However, this is consistent with its intended purpose of repository maintenance. - Ingestion points: Reads from
registry.json,README.md, and various.meta.jsonfiles within discovered artifact directories. - Boundary markers: Data is parsed into structured formats (JSON/Python objects), but no explicit LLM boundary markers are used in the generated summaries.
- Capability inventory: Includes file system writes (registry/readme updates) and system command execution (parity checks via subprocess).
- Sanitization: Uses standard JSON parsing and regular expressions for data extraction; no specific sanitization is applied for the purpose of preventing instruction injection.
- [SAFE]: The skill employs dynamic module loading via
importlib.utilinlib/workflow_state/inventory.py. This mechanism is used to share business logic across different scripts in the toolkit. The module paths are strictly controlled and relative to the skill's own installation path, preventing the execution of arbitrary or untrusted code.
Audit Metadata