doc-code-sync
Warn
Audited by Gen Agent Trust Hub on Feb 21, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- Dynamic Execution (MEDIUM): The script
references/extractors/typescript-ast.jsdynamically resolves and loads thetypescriptmodule from thenode_modulesdirectory of the target project being scanned. - Evidence:
require(require.resolve("typescript", { paths: [projectRoot] }))intypescript-ast.js. An attacker providing a malicious project could include a roguetypescriptmodule to gain code execution. - Unverifiable Dependencies & Remote Code Execution (MEDIUM): The skill's strategy for selecting parsers involves executing code snippets via system shells to check for the presence of runtimes.
- Evidence:
references/extraction-strategy.mdspecifies the use ofnode -e "require('typescript')"andpython3 -c "import ast"for runtime detection. - Indirect Prompt Injection (LOW): The skill ingests untrusted source code files and extracts symbol names, signatures, and NatSpec documentation into a JSON format for downstream LLM processing without sanitization.
- Ingestion points: File reading in
references/extractors/typescript-ast.js. - Boundary markers: Output is structured JSON, but no explicit instructions or delimiters are added to prevent the downstream agent from following instructions embedded in the extracted strings (e.g., in code comments).
- Capability inventory: File system read access and stdout transmission.
- Sanitization: None detected for the content extracted from source code files.
Audit Metadata