specstory-yak
Pass
Audited by Gen Agent Trust Hub on Apr 19, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/lib/utils.pyusessubprocess.runto execute thegit blamecommand for identifying the author of history files. The command is invoked safely using a list of arguments without a shell, minimizing the risk of shell injection. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection. It ingests untrusted content from
.specstory/history/*.mdfiles (ingestion point) and provides this data to the LLM for mandatory summarization as directed inSKILL.md. There are no boundary markers or explicit instructions to ignore embedded commands (boundary markers absent). Capability inventory includes local command execution (git) and file system writes. No sanitization or validation of the history content is performed before processing.
Audit Metadata