anchor-sheet
Pass
Audited by Gen Agent Trust Hub on Apr 15, 2026
Risk Level: SAFE
Full Analysis
- [COMMAND_EXECUTION]: The skill executes a local Python script (
scripts/run.py) to automate data extraction. This is a standard implementation usingargparseandpathlibfor file operations. - [DATA_EXPOSURE_AND_EXFILTRATION]: No network access is requested or used. The skill only interacts with local project files such as
outline/evidence_drafts.jsonlandcitations/ref.bib, and writes tooutline/anchor_sheet.jsonl. No sensitive system files or credentials are accessed. - [INDIRECT_PROMPT_INJECTION]: The skill processes data from external files, presenting a potential surface for indirect injection.
- Ingestion points: Evidence snippets and comparisons are read from
outline/evidence_drafts.jsonlinscripts/run.py. - Boundary markers: The data is processed and stored in structured JSONL formats, which provides clear boundaries between different data objects.
- Capability inventory: Capabilities are limited to filesystem reads and writes within the local workspace directory; the skill lacks network access or the ability to execute arbitrary commands.
- Sanitization: The script filters content using specific regex patterns for quantitative data (e.g., searching for digits or benchmark-related keywords) and implements text truncation via the
_trimfunction, which reduces the risk of propagating large or complex prompt injection payloads.
Audit Metadata