tdd-execute-acpx
Pass
Audited by Gen Agent Trust Hub on Mar 30, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill orchestrates the
acpxcommand-line tool for automated code auditing and implementation. The use of the--approve-allflag in Phase 3 and Route B allows the tool to execute its logic autonomously within the provided session context. - [COMMAND_EXECUTION]: Uses
git rev-parse HEADandgit statusto establish a baseline and ensure a clean working environment before beginning the TDD cycle. - [PROMPT_INJECTION]: The skill manages an attack surface for indirect prompt injection when processing external task descriptions:
- Ingestion points: Reads task definitions from user-provided plan files (e.g., in
.claude/plan/) and scans existing production code (SKILL.md). - Boundary markers: Not explicitly defined in the prompts to separate external file content from the agent's core instructions.
- Capability inventory: The agent can execute the
acpxtool, perform git operations, and trigger thecode-reviewerskill. - Sanitization: The skill contains an explicit protocol in the Core Protocols section to sanitize secrets before including file contents in any generated prompt file, reducing the risk of accidental credential exposure.
- [PROMPT_INJECTION]: In
tdd-specialist-role.md, the agent is instructed to create test cases for security vulnerabilities (e.g., SQL injection strings and XSS payloads). This is a standard and expected behavior for a TDD specialist role and is used for testing application defenses rather than attacking the agent itself.
Audit Metadata