spec-driven-dev
Pass
Audited by Gen Agent Trust Hub on Apr 20, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill autonomously executes shell commands to perform repository management and development tasks.
- Evidence: Uses
gitfor staging, committing, merging, and resetting progress within the user's project directory. - Evidence: Executes project-defined test suites and linters as part of the implementation and review cycle during
/spec-goand/spec-taskcommands. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it processes external project data to drive its automated implementation loop.
- Ingestion points: The agent reads various Markdown files in the
.kiro/specs/directory (requirements.md,design.md,tasks.md,spec.md), as well as projectREADME.mdand steering documents. - Boundary markers: There are no explicit delimiters or specific instructions provided to the agent to disregard instructions embedded within these files.
- Capability inventory: The agent has the authority to write files, perform
gitoperations, and execute project-defined code (tests and linters). - Sanitization: The skill does not perform validation or sanitization of the content of the specification files before using them to generate or modify source code.
Audit Metadata