bmad-create-ux-design
Pass
Audited by Gen Agent Trust Hub on May 10, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill has an indirect prompt injection surface (Category 8) as it is designed to discover and ingest untrusted project documentation into the agent context.\n
- Ingestion points:
step-01-init.mdidentifies and loads documents (PRDs, briefs, project context) from multiple local directories including{product_knowledge}and{project-root}/docs.\n - Boundary markers: The workflow lacks explicit boundary markers or 'ignore' instructions for the agent when processing these external documents.\n
- Capability inventory: The skill possesses capabilities for shell command execution (via
python3), file system modification (writing.mdand.htmlfiles), and invocation of other bmad-* skills.\n - Sanitization: Content from discovered documents is loaded without validation or sanitization.\n- [COMMAND_EXECUTION]: The skill executes local Python scripts (
resolve_customization.py) to manage customization and workflow completion as seen inSKILL.mdandstep-14-complete.md. These scripts are located in the project's_bmad/scripts/directory and are part of the vendor's internal architecture.\n- [COMMAND_EXECUTION]: The workflow involves generating interactive HTML files (ux-color-themes.htmlandux-design-directions.html) to visualize design decisions. This constitutes dynamic generation of UI code based on project context, which is a standard feature for this skill type.
Audit Metadata