kata-execute-quick-task
Pass
Audited by Gen Agent Trust Hub on Apr 10, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill exhibits a surface for indirect prompt injection by reading content from external issue files and interpolating it into sub-agent prompts.
- Ingestion points: The skill reads the
## Problemsection from a file specified via the--issueflag in$ARGUMENTS(SKILL.md). - Boundary markers: The agent prompt uses XML-style tags like
<planning_context>and<constraints>to separate external data from system instructions (SKILL.md). - Capability inventory: The skill and its sub-agents have capabilities including file system access (mkdir, ls, cat, sed), Git operations (commit, checkout, branch, push), and GitHub CLI access (gh pr create, gh issue close).
- Sanitization: While metadata like the issue title is processed, the problem description is interpolated directly into the planner's prompt without specific escaping for prompt injection (SKILL.md).
- [COMMAND_EXECUTION]: The skill executes several shell commands to manage the task lifecycle.
- File Operations: Uses
mkdir,ls,cat,grep, andsedto manage project structure and extract metadata. - Git Operations: Performs commits and branch management based on user-provided task descriptions.
- GitHub Integration: Uses the
ghCLI to create pull requests and close issues based on project configuration. - Local Script Execution: Executes
node scripts/kata-lib.cjsto retrieve configuration values, which is a project-local utility.
Audit Metadata