planning-task
Warn
Audited by Gen Agent Trust Hub on Mar 28, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The workflow instructions in
SKILL.md(Phases 2 and 3) direct the agent to load and execute Python scripts using theexec()function on content read fromscripts/generate_plan.pyandscripts/generate_todo.py. This method of dynamic loading is a high-risk pattern that can be used to execute arbitrary code if the filesystem is manipulated.\n- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it processes untrusted user input to generate task plans and markdown files without adequate safeguards.\n - Ingestion points: User-provided project goals or requests (processed in
SKILL.mdasuser_intent).\n - Boundary markers: Absent; there are no delimiters or explicit instructions to the agent to disregard embedded commands within the user input.\n
- Capability inventory: The skill writes to the filesystem (
workspace/plan.json,workspace/todo.md) and executes Python logic within the agent's code execution context.\n - Sanitization: Absent; no validation, filtering, or escaping is performed on the user-provided string before it is interpolated into task objects and saved to files.
Audit Metadata