bmad-agent-tech-writer
Pass
Audited by Gen Agent Trust Hub on May 10, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The activation sequence in
SKILL.mdexecutes a Python script located at{project-root}/_bmad/scripts/resolve_customization.pyto merge configuration files during setup. - [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface by automatically loading files matching
**/project-context.mdinto the agent's persistent memory for context. * Ingestion points:SKILL.md(Step 4) andcustomize.toml(persistent_factsarray). * Boundary markers: No delimiters or sanitization warnings are applied to the ingested content from these files. * Capability inventory: The agent is instructed to execute local Python scripts and utilizes subprocesses for tasks like web research as described inwrite-document.md. * Sanitization: There is no evidence of content filtering or validation for the ingested project facts. - [EXTERNAL_DOWNLOADS]: The instruction set in
write-document.mdsuggests the use of subprocesses for web searching and research tasks, which establishes a capability for outbound network access during the research phase.
Audit Metadata