skills/ssiumha/dots/pj-init/Gen Agent Trust Hub

pj-init

Pass

Audited by Gen Agent Trust Hub on Feb 21, 2026

Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
  • [COMMAND_EXECUTION] (SAFE): The skill utilizes standard shell commands such as pwd, ls, and git remote to identify repository structures and project metadata. These operations are local and do not involve elevated privileges or remote command execution.
  • [PROMPT_INJECTION] (LOW): The skill is susceptible to Indirect Prompt Injection (Category 8) as it processes data from untrusted local files to generate the CLAUDE.md workspace configuration.
  • Ingestion points: File contents from README, package.json, and pyproject.toml located in subdirectories.
  • Boundary markers: Absent; the skill does not use delimiters or instructions to prevent the agent from obeying commands embedded within the analyzed project files.
  • Capability inventory: Local shell command execution (git) and file system write access (CLAUDE.md generation and ldoc initialization).
  • Sanitization: Absent; the skill extracts strings from local files and interpolates them directly into templates.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 21, 2026, 03:26 PM