simple-formatter

Pass

Audited by Gen Agent Trust Hub on Feb 19, 2026

Risk Level: SAFE
Full Analysis
  • [Prompt Injection] (SAFE): No instructions attempting to override agent behavior or bypass safety filters were detected in the skill metadata or instructions.
  • [Data Exposure & Exfiltration] (SAFE): The skill performs local string manipulation only. No network calls (curl, wget, etc.) or sensitive file path access (~/.ssh, ~/.aws) were found.
  • [Indirect Prompt Injection] (LOW): The skill processes untrusted user input provided via command line arguments in scripts/formatter.py.
  • Ingestion points: User-provided text passed through sys.argv.
  • Boundary markers: None present.
  • Capability inventory: Limited to string manipulation (regex, capitalization). No file-writes, subprocess calls, or network operations.
  • Sanitization: None, but the lack of dangerous capabilities mitigates the risk.
  • [Remote Code Execution] (SAFE): No patterns for downloading or executing remote scripts (e.g., pipe to bash) were identified.
  • [Dynamic Execution] (SAFE): The Python scripts use standard library functions and do not employ eval(), exec(), or other dynamic code execution methods.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 19, 2026, 07:16 PM