progress
Pass
Audited by Gen Agent Trust Hub on Mar 7, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes shell utilities (
grep,glob) to traverse the file system and inspect Java source files within theruoyi-modulesdirectory. - [PROMPT_INJECTION]: The skill processes untrusted data from local source code, creating a surface for indirect prompt injection (Category 8).
- Ingestion points: Text is read from
*.javafiles viagreppatterns targetingTODO:andFIXME:markers inside theruoyi-modules/directory. - Boundary markers: Content retrieved from files is interpolated into the agent's context without clear delimiters or 'ignore instructions' warnings.
- Capability inventory: The skill uses
grepandglobfor data ingestion. It also references potential write capabilities through associated commands like/crudand/devmentioned in the quick actions section. - Sanitization: No evidence of escaping or validation is present for the content extracted from code comments before it is processed by the AI.
Audit Metadata