security-scanner
Pass
Audited by Gen Agent Trust Hub on Apr 20, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes internal Python scripts (e.g.,
secrets-detector.py,dependency-checker.py) using theuvtool to perform automated security analysis of the codebase. - [COMMAND_EXECUTION]: Invokes
git logwith the--diff-filter=Dflag to inspect the history of deleted files, which is used to identify credentials that may have been committed and then removed. - [DATA_EXPOSURE]: The skill is designed to read the entire contents of a project directory, including sensitive files like
.env, configuration files, and source code, to identify vulnerabilities and hardcoded secrets. This behavior is the intended primary function of the scanner. - [INDIRECT_PROMPT_INJECTION]: As a code analysis tool, the skill processes untrusted local data that could contain malicious patterns designed to influence the AI's assessment.
- Ingestion points: Files are read via
os.walkandopen()calls in the scanning scripts. - Boundary markers: The skill uses explicit structured taxonomies (CWE/OWASP) and confidence scores to frame findings.
- Capability inventory: The skill has read access to all files and can execute shell commands via
uv runandgitCLI. - Sanitization: The
dashboard.htmltemplate includes a JavaScript escaping function (escH) to sanitize findings before rendering them in the browser report, mitigating potential XSS from malicious code patterns.
Audit Metadata