openspec-apply-change
Pass
Audited by Gen Agent Trust Hub on Apr 2, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses the
openspecCLI to perform operations such as listing changes, checking status, and fetching implementation instructions. It interpolates change names (which can be derived from user input or conversation context) into shell commands (e.g.,openspec status --change "<name>" --json). While the instructions use double quotes to wrap the variable, this remains a potential point of command injection if the agent does not properly sanitize the input. - [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface by consuming and acting upon data returned from the
openspecCLI. - Ingestion points: The skill reads
contextFiles, a list of tasks, and adynamic instructionfield from the JSON output ofopenspec instructions apply --json. - Boundary markers: There are no explicit delimiters or instructions provided to the agent to ignore or isolate potentially malicious natural language instructions contained within the CLI output.
- Capability inventory: The skill possesses the capability to execute shell commands via the
openspectool, read arbitrary files listed in thecontextFilesoutput, and modify task files (e.g., toggling markdown checkboxes). - Sanitization: There is no validation or sanitization of the file paths or dynamic instructions returned by the CLI before the agent processes them.
Audit Metadata