expect
Pass
Audited by Gen Agent Trust Hub on Apr 15, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: Indirect prompt injection vulnerability. The skill ingests untrusted data from
git diff(viascripts/diff-scan.sh) and interpolates it directly into the prompt for a sub-agent as defined inreferences/test-plan.md. Malicious instructions embedded in code comments or strings within a diff could potentially influence the sub-agent's behavior. - Ingestion points: Git diff output processed by
scripts/diff-scan.shand passed to the agent prompt inreferences/test-plan.md. - Boundary markers: Absent. The prompt uses section headers but lacks explicit instructions for the agent to ignore instructions embedded within the diff data.
- Capability inventory: The sub-agent has access to
Bashand theagent-browsertoolset (includingclick,fill, andevalcapabilities). - Sanitization: No sanitization or filtering of the diff content is performed before interpolation.
- [COMMAND_EXECUTION]: The skill makes extensive use of the
Bashtool to perform git operations (git diff,git log,git rev-parse) and to execute internal helper scripts (scripts/diff-scan.sh,scripts/fingerprint.sh,scripts/route-map.sh) which use Python for data processing. This is fundamental to the skill's logic for identifying changed code and mapping it to testable routes. - [EXTERNAL_DOWNLOADS]: For session recording functionality, the skill is configured to fetch the
rrweblibrary from the JSDelivr CDN (https://cdn.jsdelivr.net/npm/rrweb@2.0.0-alpha.4/dist/rrweb-all.min.js) and inject it into the browser context using anevalcommand, as documented inreferences/rrweb-recording.md.
Audit Metadata