compliance-audit

Pass

Audited by Gen Agent Trust Hub on Feb 12, 2026

Risk Level: LOWNO_CODE
Full Analysis

The provided SKILL.md file is a purely descriptive document. It outlines a multi-phase process for conducting a compliance audit, including gathering session data, checking compliance requirements, generating a report, and logging to a session journal. The skill's instructions are presented in natural language and markdown tables, detailing what data points to collect and what checks to perform.

No executable code (e.g., shell scripts, Python, JavaScript) is present within the skill file. The commands mentioned, such as git rev-list, git diff, wc -l, and grep, are standard system utilities. They are referenced as sources for data collection, implying that an external agent or environment would execute these commands and provide their output for the skill to process and interpret, rather than the skill itself executing them in a malicious context.

Threat Category Assessment:

  • Prompt Injection: No patterns indicative of prompt injection (e.g., 'IMPORTANT: Ignore', 'You are now unrestricted') were found. The skill's purpose is auditing, not manipulating the AI's behavior.
  • Data Exfiltration: No network operations (curl, wget, fetch) or direct instructions to read and transmit sensitive files (e.g., ~/.aws/credentials, ~/.ssh/id_rsa) are present. The skill describes collecting data points, but not exfiltrating them.
  • Obfuscation: No Base64, zero-width characters, homoglyphs, or other encoding techniques were detected. The content is clear and readable.
  • Unverifiable Dependencies: No instructions to install external packages (npm install, pip install) or download scripts from external URLs were found. The skill relies on common system utilities, which are not considered unverifiable dependencies in this context.
  • Privilege Escalation: No commands like sudo, chmod +x, chmod 777, or instructions for installing services or modifying system files were found.
  • Persistence Mechanisms: No attempts to modify user configuration files (.bashrc), create cron jobs, or establish other persistence mechanisms were detected.
  • Metadata Poisoning: The skill's front matter (name, description) and the markdown content are benign and align with the stated purpose.
  • Indirect Prompt Injection: While any skill processing external data (like git diff output) could theoretically be susceptible to indirect prompt injection if the data itself contains malicious prompts, this skill does not introduce a new vulnerability in this regard. It merely describes processing existing code changes.
  • Time-Delayed / Conditional Attacks: No conditional logic based on dates, usage counts, or environment variables that would trigger malicious behavior was found.

Adversarial Reasoning: Given that the skill is purely descriptive markdown, there are no direct avenues for an attacker to hide malicious executable code within the skill itself. Any potential risk would lie in the environment where the agent interprets these instructions and executes the mentioned git commands, or if the output of those commands were to contain malicious content that could then be indirectly injected into the LLM. However, the skill's instructions themselves are benign and do not facilitate such attacks.

Audit Metadata
Risk Level
LOW
Analyzed
Feb 12, 2026, 02:19 PM