code-no-test
Pass
Audited by Gen Agent Trust Hub on Apr 29, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes complex shell pipelines to locate and sort project plans, specifically using
find,stat,sort,head, andcutwithin the Step 0 logic. - [COMMAND_EXECUTION]: Executes a local Python script located at
.claude/scripts/code_graphto perform code analysis. This creates a dependency on unverified local scripts existing within the workspace. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection (Category 8) as it processes untrusted data from implementation plans and user-provided arguments to drive agent behavior.
- Ingestion points: Reads data from
$ARGUMENTSand local files such as./plans/plan.mdand specific phase files (e.g.,phase-01-preparation.md). - Boundary markers: Uses
<plan>tags to encapsulate input arguments, but lacks explicit "ignore instructions" delimiters for external file content. - Capability inventory: The agent has the ability to read/write files, execute shell commands, run local Python scripts, and perform git commits.
- Sanitization: There is no evidence of sanitization or structural validation for the content parsed from the plan files before it is used to initialize
TaskCreatetasks.
Audit Metadata