code-analyzer
Pass
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes standard, read-only shell commands such as
find,ls, andcatto explore repository structures and read documentation or script files. These commands are executed locally and do not require elevated privileges.\n- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection by processing untrusted data from external repositories.\n - Ingestion points: The agent reads and interprets the contents of files within the
code/directory, includingREADME.md, Python scripts, and Jupyter Notebooks.\n - Boundary markers: No delimiters or explicit instructions are provided to the agent to disregard potential instructions embedded within the analyzed file content.\n
- Capability inventory: The skill includes file system inspection and text generation capabilities, but lacks network access or dangerous execution functions like
eval.\n - Sanitization: The skill does not perform any sanitization or filtering of the text extracted from the code repository before the agent processes it for methodology extraction.
Audit Metadata