mega-code-status
Pass
Audited by Gen Agent Trust Hub on Mar 20, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes local shell commands and vendor-specific CLI tools using
uv runto verify authentication and retrieve pipeline status information. - [DATA_EXFILTRATION]: Accesses the local file system at
~/.local/share/mega-code/to read configuration paths and metadata about pending items. This access is restricted to the skill's own operational data. - [PROMPT_INJECTION]: The skill ingests untrusted data by reading and displaying descriptions from markdown files located in
pending-skillsandpending-strategiesdirectories. - Ingestion points: Reads
description:fields fromSKILL.mdand titles from various.mdfiles in~/.local/share/mega-code/data/. - Boundary markers: None identified.
- Capability inventory: Uses
BashandReadpermissions to list and parse file contents. - Sanitization: Employs
head -c 60to truncate the displayed metadata, which provides a minor degree of mitigation against large-scale injection payloads.
Audit Metadata