discipline-refactor
Pass
Audited by Gen Agent Trust Hub on Mar 27, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes the
Bashsubagent and various file-system tools to perform structural changes and validate the refactor. It specifically callsgit mv,mkdir, and executes local test suites likepytestornpm test. While these operations are consistent with the skill's primary purpose, they involve executing and manipulating code found within the target repository. - [INDIRECT_PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface (Category 8) because it ingests data from the local repository environment to drive automated planning and execution phases.
- Ingestion points: The
Exploresubagent scans repository directories and reads configuration files such aspyproject.tomlandpackage.jsoninSKILL.md(Phase 1). - Boundary markers: External context from previous steps is interpolated into prompts for the
Planandgeneral-purposesubagents (e.g.,{analysis_results},{migration_plan}) without the use of delimiters or instructions to ignore embedded commands. - Capability inventory: The skill possesses the ability to modify the file system via
git, update import statements in source files, and execute arbitrary shell commands via theBashsubagent during the validation phase. - Sanitization: No sanitization or validation of the ingested repository metadata (file names, module names, or config values) is evident before the data is used to generate the migration tasks.
Audit Metadata