development
Pass
Audited by Gen Agent Trust Hub on Mar 12, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill instructs the agent to execute a variety of local development commands to verify implementations.
- Evidence in
SKILL.md: Execution ofmake ci-checkfor Go backends. - Evidence in
SKILL.md: Execution ofbun run build,bun run lint, andbun run testfor frontend projects. - Evidence in
SKILL.md: Execution ofdocker compose up -d --buildanddocker compose psfor environment management. - Evidence in
SKILL.md: Execution ofcurl http://localhost:8080/api/healthfor local connectivity checks. - Evidence in
SKILL.md: Execution of a custom review tool viacodex review --uncommitted. - [PROMPT_INJECTION]: The skill contains a surface for indirect prompt injection by requiring the agent to follow instructions contained in project-level documentation.
- Ingestion points: The agent is instructed to follow procedures in
RUNBOOK.mdand synchronize state inSTATUS.md,SPEC.md,ARCHITECTURE.md, andRUNBOOK.md. - Capability inventory: The agent has the capability to execute shell commands (
make,bun,docker,codex) and perform network requests (curl). - Boundary markers: No explicit boundary markers or 'ignore embedded instructions' warnings are provided when processing these files.
- Sanitization: No sanitization or validation of the contents of
RUNBOOK.mdis specified before the agent follows its instructions.
Audit Metadata