flow-next-audit
Pass
Audited by Gen Agent Trust Hub on May 13, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses the
Bashtool to execute various system commands includinggit,grep,jq,sed, anddate. It also executes a bundled utility calledflowctllocated within the plugin's script directory. These tools are used as intended for auditing project files and managing repository state. - [DATA_EXFILTRATION]: The skill is designed to interact with GitHub using the
ghcommand-line tool to create pull requests for audited changes. This activity targets a well-known service as part of the expected development workflow. - [PROMPT_INJECTION]: The skill presents an indirect prompt injection surface because it ingests and processes content from
.flow/memory/files andGLOSSARY.mdfiles, which may contain untrusted data. - Ingestion points: The skill walks the memory tree and reads the body of memory entries in
workflow.md(Phase 0.1 and Phase 1.1). - Boundary markers: There are no explicit delimiters or instructions to ignore embedded commands when the agent processes the ingested content.
- Capability inventory: The skill has the ability to write or edit files (
WriteandEdittools inworkflow.mdPhase 4 and Phase 6), delete files (git rminworkflow.mdPhase 4), and perform git operations including commits and pull request creation (workflow.mdPhase 5). - Sanitization: No sanitization or validation of the ingested content is performed before it is used by the agent to make engineering decisions.
Audit Metadata