qa-plan
Pass
Audited by Gen Agent Trust Hub on Apr 29, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The instructions include a directive to "Ignore spec.json's
qaScenarios[]". While "ignore" is a keyword often associated with prompt injection, in this specific context it is a legitimate instruction for the AI to perform its intended task by generating original scenarios instead of reusing existing ones. - [COMMAND_EXECUTION]: The skill invokes local command-line tools like
gitandgh(GitHub CLI) to retrieve code diffs and pull request information. It also usesmkdirto create local directories for its output. - [INDIRECT_PROMPT_INJECTION]: This skill possesses an attack surface for indirect prompt injection because it processes content from project files (
SPEC.md,spec.json) and external pull request data which could contain malicious instructions. - Ingestion points: The skill reads content from
SPEC.md,spec.json,git diffoutput, andgh pr viewoutput. - Boundary markers: The instructions do not define clear boundaries or provide warnings to the agent about ignoring embedded instructions within the processed data.
- Capability inventory: The skill can read/write to the local file system and execute shell commands (
git,gh,mkdir). - Sanitization: There are no explicit sanitization steps defined for the external data being processed.
Audit Metadata