prd-taskmaster-v2
Pass
Audited by Gen Agent Trust Hub on Apr 14, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses Python's
subprocess.runto execute commands forgit,npm, andtask-master-ai. Most calls use the list format which prevents shell injection vulnerabilities. - Evidence: Found in
script.py,mcp_server/taskmaster.py, andmcp_server/lib.py. - [EXTERNAL_DOWNLOADS]: The skill uses an installation script hosted on the author's public GitHub repository. This script clones the repository and copies files to the local skills directory.
- Evidence:
install.shandREADME.mdreferencehttps://raw.githubusercontent.com/anombyte93/prd-taskmaster/main/install.sh. - [REMOTE_CODE_EXECUTION]: The skill's primary installation method is a
curl | bashpattern from a remote source controlled by the author. - Evidence: Pattern detected in
README.mdandinstall.sh. - [PROMPT_INJECTION]: The skill ingests Project Goals and PRD content provided by the user. These inputs are interpolated into agent instructions during discovery and expansion phases without strict boundary markers, representing an indirect prompt injection surface.
- Evidence:
phases/DISCOVER.mdandcompanion-skills/expand-tasks/script.pyingest untrusted content into prompts. - [COMMAND_EXECUTION]: The skill includes functionality to dynamically generate and write utility scripts (for time tracking, rollbacks, and security audits) to the project's local directory and grants them executable permissions.
- Evidence:
cmd_gen_scriptsfunction inscript.pywrites multiple shell and Python utilities.
Audit Metadata