openspec-explore
Pass
Audited by Gen Agent Trust Hub on Mar 22, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes the
openspecCLI tool (specificallyopenspec list --json) to retrieve project context and active change statuses. This command execution is essential for the skill's primary purpose and is restricted to the required tool. - [PROMPT_INJECTION]: The skill exhibits an attack surface for indirect prompt injection as it is designed to read and process content from the local codebase and OpenSpec artifacts which could contain untrusted data.
- Ingestion points: The agent reads from codebase files and specific artifact paths such as
openspec/changes/<name>/proposal.md,design.md, andtasks.md. - Boundary markers: No explicit delimiters or instructions to ignore embedded commands are specified when the agent interpolates file content into its context.
- Capability inventory: The agent has the capability to execute the
openspecCLI and write content to OpenSpec artifact files (specs, designs, tasks). - Sanitization: No sanitization or validation logic is defined for the content ingested from the codebase or artifacts.
Audit Metadata