bmad-correct-course
Warn
Audited by Gen Agent Trust Hub on May 10, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes a local Python script
{project-root}/_bmad/scripts/resolve_customization.pyduring multiple phases of its workflow to handle configuration merging and resolution. - [COMMAND_EXECUTION]: The workflow is designed to dynamically execute commands specified in configuration fields such as
activation_steps_prepend,activation_steps_append, andon_complete. These fields can be populated by project-local.tomlfiles, enabling the execution of arbitrary instructions by the agent based on local configuration. - [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface by performing a
FULL_LOADof numerous project documents (PRD, Epics, Architecture, UX, Specs) and other files matching the**/project-context.mdglob. Maliciously crafted content in these files could potentially manipulate the agent's behavior, particularly given its ability to run shell commands. - Ingestion points: Multiple Markdown files are loaded from the project directory based on wildcard patterns defined in
SKILL.mdandcustomize.toml. - Capability inventory: The agent can execute shell commands via
python3and is instructed to treat specific configuration strings as terminal commands. - Boundary markers: No explicit delimiters or instructions to ignore embedded commands are used when ingesting these files.
- Sanitization: The skill does not perform any sanitization or verification of the content loaded from the project artifacts.
Audit Metadata