draft-polisher
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFE
Full Analysis
- [Dynamic Execution] (LOW): The script modifies
sys.pathto dynamically import local modules (tooling.common,tooling.quality_gate) from a path calculated relative to the script's location. This is standard behavior for repository-internal tooling but constitutes dynamic loading from computed paths. - [Indirect Prompt Injection] (LOW): The script processes untrusted Markdown content which could theoretically contain injection attempts, though it primarily uses regex for citation extraction.
- Ingestion points: Reads
DRAFT.mdandMERGE_REPORT.mdfrom the path provided in--workspace. - Boundary markers: None detected.
- Capability inventory: File system write access (
atomic_write_text) used to generatecitation_anchors.prepolish.jsonl. - Sanitization: No sanitization or escaping is performed on the draft content before processing.
Audit Metadata