readme
Pass
Audited by Gen Agent Trust Hub on Mar 3, 2026
Risk Level: SAFE
Full Analysis
- [SAFE]: No malicious patterns, command executions, or network requests were identified in the skill instructions. The skill operates within the expected scope of a documentation generator.
- [DATA_EXPOSURE]: The skill reads standard project configuration files (e.g., package.json, requirements.txt, Gemfile) to identify dependencies and project type. It does not target sensitive files like .env, private keys, or cloud credentials.
- [PROMPT_INJECTION]: The instructions do not contain any bypass attempts, role-play injections, or commands to ignore safety guidelines.
- [INDIRECT_PROMPT_INJECTION]: The skill processes content from the local codebase to generate documentation. While this creates a surface where malicious content in source files could influence the README output, the impact is limited to the documentation itself and does not enable code execution or data exfiltration.
- Ingestion points: Existing README.md, package.json, requirements.txt, and source directory listings.
- Boundary markers: Absent.
- Capability inventory: Reading and writing local files (README.md).
- Sanitization: Absent.
Audit Metadata