bugfix-crate
Pass
Audited by Gen Agent Trust Hub on Apr 1, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill processes untrusted external data from an issues file and crate source code, creating a surface for indirect prompt injection.\n
- Ingestion points: The
$issues_filemarkdown and crate source files are read into the agent context inSKILL.md.\n - Boundary markers: Absent; no specific delimiters or instructions are used to distinguish external data from system prompts.\n
- Capability inventory: The skill uses
Bash,Write, andEdittools as defined inSKILL.md.\n - Sanitization: Absent; content read from external files is not validated or filtered before processing.\n- [COMMAND_EXECUTION]: The skill executes shell commands using
cargo testandcargo clippyvia theBashtool inSKILL.md.\n - This involves running code within the target crate, such as build scripts and procedural macros, which can execute arbitrary code if the crate source is malicious.
Audit Metadata