code-hardcode-audit
Pass
Audited by Gen Agent Trust Hub on Apr 4, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill uses
subprocess.runacross multiple scripts (audit_hardcodes.py,run_gitleaks.py,run_trufflehog.py, etc.) to invoke external security scanners. These calls are implemented using list-based arguments rather than shell strings, which is a recommended security practice for executing external commands. - [EXTERNAL_DOWNLOADS]: The script
scripts/run_jscpd.pyexecutesnpx jscpd, which fetches thejscpdpackage from the NPM registry. As NPM is a well-known service and the tool is a standard utility for copy-paste detection, this is considered a safe and intended behavior for the skill's purpose. - [INDIRECT_PROMPT_INJECTION]: The skill possesses a surface for indirect prompt injection because it analyzes untrusted source code and incorporates the resulting findings into the agent's context. However, the risk is mitigated as the skill acts as a security auditor, and the wrapper scripts often truncate match data (e.g., in Gitleaks and TruffleHog) to reduce exposure.
Audit Metadata