bmad-agent-pm
Warn
Audited by Gen Agent Trust Hub on Apr 21, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill is configured to execute a script at
{project-root}/_bmad/scripts/resolve_customization.pyusing theuv runcommand immediately upon activation. This behavior creates a security dependency on the integrity of scripts within the user's project directory, which could be compromised in collaborative or untrusted environments. - [PROMPT_INJECTION]: The skill implements an indirect prompt injection surface by recursively searching for and loading all files named
project-context.mdwithin the project root. The content of these files is adopted as foundational reference for the agent's behavior without sanitization. • Ingestion points:{project-root}/_bmad/bmm/config.yamland{project-root}/**/project-context.mdas specified inSKILL.md. • Boundary markers: No delimiters or explicit instructions to ignore embedded commands are present. • Capability inventory: The skill can execute shell commands viauv runand dispatch calls to other registered skills. • Sanitization: The skill does not perform any validation or filtering on the content loaded from the project directory.
Audit Metadata