clean-code-reviewer

Pass

Audited by Gen Agent Trust Hub on May 5, 2026

Risk Level: SAFE
Full Analysis
  • [COMMAND_EXECUTION]: The script scripts/pre-review.py uses subprocess.run to execute the ruff linter. This is a standard practice for static analysis and uses structured arguments to prevent command injection.
  • [PROMPT_INJECTION]: The skill has an indirect prompt injection surface as it is designed to analyze untrusted user-provided code.
  • Ingestion points: User code provided in prompts or files analyzed by scripts/pre-review.py.
  • Boundary markers: Not explicitly defined in the instructions.
  • Capability inventory: Local file reading and execution of the ruff linter via scripts/pre-review.py.
  • Sanitization: None; the agent processes input code directly for review purposes.
Audit Metadata
Risk Level
SAFE
Analyzed
May 5, 2026, 08:22 AM