agent-teams
Pass
Audited by Gen Agent Trust Hub on May 11, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: Several agents are authorized to use the
Bashtool for standard development tasks related to their specific roles. - The
Quality AgentusesBashto execute test commands and check coverage. - The
Security AgentusesBashto run security audit tools likenpm auditandsafetyto check for dependency vulnerabilities. - The
Merger AgentutilizesBashfor git operations and interacting with the GitHub CLI (gh) to create pull requests. - [SAFE]: The skill architecture inherently includes security best practices by making security scanning a mandatory gate in the development pipeline. The
Security Agentis specifically instructed to detect hardcoded secrets and OWASP vulnerabilities. - [SAFE]: The workflow involves ingesting user-provided feature specifications from the
_project_specs/features/directory, which represents an indirect prompt injection surface. - Ingestion points: Specification files are read by the
Team LeadandFeature AgentsinSKILL.mdandagents/feature.md. - Boundary markers: Explicit delimiters for the ingested data are not defined in the instructions.
- Capability inventory: The skill allows agents to modify files (
Write/Edit) and create pull requests (ghCLI). - Sanitization: No explicit sanitization or validation of the markdown content is performed prior to ingestion.
- The risk is considered acceptable as it is a fundamental part of the skill's intended purpose to translate user requirements into code.
Audit Metadata