system-architecture
Pass
Audited by Gen Agent Trust Hub on May 9, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection through the ingestion of untrusted external data.
- Ingestion points: The orchestrator reads data from
spec.md,prioritize.md, and all files in the.agents/product/flow/directory using theGlobandReadtools. - Boundary markers: The instructions do not define explicit delimiters or 'ignore embedded instructions' warnings for the data ingested from these files before passing them to sub-agents (stack-selection, schema, etc.).
- Capability inventory: The skill has access to powerful tools including
Bash,Read,Grep, andGlobwhich can be used to modify the filesystem or execute shell commands. - Sanitization: There is no evidence of sanitization or filtering of the external markdown content before it is interpolated into agent prompts.
- [COMMAND_EXECUTION]: The skill uses the
Bashtool to perform technical orchestration and artifact generation. While standard for a technical design agent, this capability could be exploited if an attacker provides a malicious product specification designed to trigger command injection via the agent's shell access.
Audit Metadata