bmad
Fail
Audited by Gen Agent Trust Hub on Mar 20, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The
scripts/install.shfile and setup instructions inSETUP.mduse a piped execution pattern (curl -sSfL https://plannotator.ai/install.sh | sh) to install external components. This allows for arbitrary code execution from a remote server without any integrity verification or sandboxing.\n- [EXTERNAL_DOWNLOADS]: The skill requires downloading and running external scripts and binaries fromplannotator.ai. This domain is not recognized as a trusted organization or well-known service within the established security scope, introducing an unverifiable dependency on third-party infrastructure.\n- [COMMAND_EXECUTION]: Several scripts, includingscripts/check-status.shandscripts/phase-gate-review.sh, use thepython3 -cflag to execute dynamically generated Python logic for YAML parsing and state management. This increases the potential for code injection if internal file contents or environment variables are manipulated.\n- [PROMPT_INJECTION]: The skill is designed to ingest and process user-provided documents like Product Requirements Documents (PRDs) and Technical Specifications. These documents serve as ingestion points for untrusted data. While thefabricpattern inSKILL.mduses boundary markers, the skill lacks rigorous input sanitization, making it vulnerable to indirect prompt injection where malicious instructions embedded in project documentation could influence agent behavior.
Recommendations
- HIGH: Downloads and executes remote code from: https://plannotator.ai/install.sh - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata