openspec-explore
Pass
Audited by Gen Agent Trust Hub on Apr 27, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes
openspec list --jsonto retrieve project context, including active changes and their statuses. This is a local command intrinsic to the skill's purpose as an OpenSpec thinking partner. - [PROMPT_INJECTION]: The skill is subject to indirect prompt injection as it ingests and processes content from local project artifacts.
- Ingestion points: Reads files from the
openspec/changes/directory, includingproposal.md,design.md, andtasks.md. - Boundary markers: There are no explicit delimiters or instructions provided to the agent to distinguish between its primary goals and the potentially untrusted content of the artifacts.
- Capability inventory: The skill can execute CLI queries and read the filesystem, but it is explicitly forbidden from implementing code or writing application features.
- Sanitization: No sanitization or verification of the artifact content is performed before processing.
Audit Metadata