sc-implement
Warn
Audited by Gen Agent Trust Hub on Mar 2, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/run_tests.pyscript utilizessubprocess.runto execute various testing frameworks (pytest, jest, vitest) based on the detected project environment, facilitating local code execution. - [COMMAND_EXECUTION]: Both
scripts/skill_learn.pyandscripts/loop_entry.pyuse dynamic loading techniques, includingimportlib.util.spec_from_file_locationandsys.pathmodification viaPath(__file__).parents[4], to load project-level modules from computed paths. - [PROMPT_INJECTION]: The skill processes external feature descriptions and codebase data, presenting an indirect prompt injection surface.
- Ingestion points: Task descriptions, existing repository files, and test results via
scripts/run_tests.py. - Boundary markers: Does not implement explicit delimiters or 'ignore' instructions when interpolating external task data into agent prompts.
- Capability inventory: Includes command execution via subprocess, file system manipulation (write/delete), and behavior persistence.
- Sanitization: Employs
yaml.safe_loadfor internal agent metadata but lacks comprehensive input validation for user-provided task descriptions.
Audit Metadata