spec-code
Pass
Audited by Gen Agent Trust Hub on Mar 30, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface by ingesting untrusted data from multiple sources to guide its execution. Malicious instructions embedded in specification documents or GitHub issues could potentially manipulate the agent into performing unauthorized actions.
- Ingestion points: The skill reads external content from
requirement.md,design.md,tasks.mdin the--specdirectory, GitHub issue descriptions viagh issue view, and feedback files provided through the--feedbackoption. - Capability inventory: The agent has the authority to create and modify source code files and execute git commands to stage and commit changes based on the instructions found in the spec files.
- Boundary markers: The execution flow does not specify delimiters or "ignore embedded instructions" warnings when interpolating the content of these external files into the agent's context.
- Sanitization: There is no evidence of sanitization or validation of the content read from specification or feedback files before the agent processes them as requirements.
- [COMMAND_EXECUTION]: The skill utilizes the GitHub CLI (
gh issue view) and git commands (git commit) to interact with the project environment. While standard for development workflows, these points of execution are driven by the task descriptions and identifiers parsed from thetasks.mdfile.
Audit Metadata