product-prd
Fail
Audited by Gen Agent Trust Hub on Mar 27, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill performs shell command interpolation using unvalidated user input, which can lead to arbitrary code execution if a malicious slug is provided.
- Evidence: In SKILL.md, the
$SLUGvariable is passed directly togo run ../../scripts/cmd/assess,go run ../../scripts/cmd/compound retrieve, andgit commit -mwithout any instructions for the agent to sanitize the input first. - [COMMAND_EXECUTION]: Untrusted keywords extracted from external documents are used in shell-based search operations.
- Evidence: Phase 2.5 in SKILL.md uses
grep -rwith keywords derived from the feature description, which could be exploited if those keywords contain shell metacharacters. - [PROMPT_INJECTION]: The skill processes external files that may contain instructions designed to override agent behavior.
- Ingestion points:
.agents/products/value-propositions/<slug>.mdand global context files likeARCHITECTURE.md. - Boundary markers: None present to distinguish instructions from the data being processed.
- Capability inventory: High-risk capabilities including shell command execution (
go run,grep,git), file system writes, and UI generation viaStitchMCP. - Sanitization: No mechanism is described to filter or escape instructions within the ingested data.
Recommendations
- AI detected serious security threats
Audit Metadata