NYC

Detect Duplicate Files

Pass

Audited by Gen Agent Trust Hub on Feb 16, 2026

Risk Level: LOWNO_CODECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [NO_CODE] (LOW): The implementation script 'find_duplicates.ps1' is referenced in the skill's implementation logic but the source code is not provided in the skill package, requiring the agent to synthesize its own version. \n- [COMMAND_EXECUTION] (LOW): The skill relies on executing PowerShell commands to perform recursive directory traversal and file hashing, which requires wide-ranging read access to the local file system. \n- [PROMPT_INJECTION] (LOW): The skill processes untrusted workspace data for deduplication reporting. 1. Ingestion points: All files located within the user-provided workspace path. 2. Boundary markers: None specified for the report generation. 3. Capability inventory: PowerShell script execution, file hashing operations, and writing results to 'DUPLICATE_REPORT.md'. 4. Sanitization: None mentioned. While hashing is non-semantic, the agent's reading of files to identify duplicates could expose it to embedded instructions in untrusted data.
Audit Metadata
Risk Level
LOW
Analyzed
Feb 16, 2026, 09:47 AM