ce-product-pulse
Pass
Audited by Gen Agent Trust Hub on May 3, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes the
!commandsyntax inSKILL.mdto execute shell commands likegit rev-parseandcatduring initialization. This is used for locating the repository root and loading local configuration files. These operations are benign and typical for developer-focused tooling. - [PROMPT_INJECTION]: The skill exhibits a surface for indirect prompt injection as it processes data from the
STRATEGY.mdfile and uses it to populate pulse reports without implementing strong boundary isolation. - Ingestion points: Data is pulled from
STRATEGY.md(metrics and product name) and.compound-engineering/config.local.yaml(pulse settings). - Boundary markers: The report assembly process in
references/report-template.mdlacks explicit boundary markers or 'ignore' instructions for the interpolated data placeholders. - Capability inventory: The skill is authorized to use the
Bash,Write,Read,Glob, andGreptools. - Sanitization: Although the skill includes logic to prevent the inclusion of PII in reports, it does not include sanitization to strip or escape potential prompt injection payloads within the ingested strategy data.
Audit Metadata