spec-driven-propose
Pass
Audited by Gen Agent Trust Hub on Mar 26, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because it ingests data from local project files that could be controlled by an attacker (e.g., in a collaborative repository or via a malicious Pull Request).
- Ingestion points: The agent reads
.spec-driven/config.yaml,.spec-driven/specs/INDEX.md, and various markdown files referenced in the index (SKILL.md, Step 2). - Boundary markers: The instructions do not specify any delimiters or warnings to ignore embedded instructions within the ingested project files.
- Capability inventory: The skill has the ability to execute shell commands (
node,ls) and write numerous files to the filesystem (SKILL.md, Steps 3, 6, and 9). - Sanitization: There is no mention of sanitizing or validating the content read from the project files before it is used to influence the agent's output or logic.
- [COMMAND_EXECUTION]: The skill executes local scripts using the
noderuntime, passing user-provided input as arguments. - Evidence: The commands
node {{SKILL_DIR}}/scripts/spec-driven.js propose <name>andnode {{SKILL_DIR}}/scripts/spec-driven.js verify <name>(SKILL.md, Steps 3 and 9) use a variable<name>obtained directly from the user. While the instructions suggest a 'kebab-case' format, there is a risk of command injection if the execution environment or the script itself does not properly escape or validate this input.
Audit Metadata