find-missing-translations

Pass

Audited by Gen Agent Trust Hub on Mar 30, 2026

Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill uses a sequence of shell utilities including grep, sed, comm, and sort to compare Android XML resource files. It employs process substitution and while loops to identify missing keys and extract values for translation.
  • [COMMAND_EXECUTION]: A command injection surface exists in Step 3 where the $key variable is interpolated into a grep command string within double quotes (grep "name=\"$key\""). This allows for shell expansion of the variable's content if the source XML files contain maliciously crafted name attributes.
  • Ingestion points: amethyst/src/main/res/values/strings.xml and target locale files.
  • Boundary markers: Absent; the script does not isolate the extracted data from the shell command logic.
  • Capability inventory: Shell execution capabilities (grep, bash subshells) are used to process project data.
  • Sanitization: Absent; the skill does not perform escaping or validation on the resource keys extracted from the XML files before using them in shell variables.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 30, 2026, 01:25 PM