prd
Pass
Audited by Gen Agent Trust Hub on Apr 10, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill processes untrusted data from web searches and sub-agents, creating a surface for indirect prompt injection.
- Ingestion points: Web search results from
ToolSearchandfetch_url, and sub-agent outputs read from/tmp/prd-research-*.mdin SKILL.md. - Boundary markers: There are no explicit delimiters or instructions to ignore embedded commands when synthesizing research findings into the PRD.
- Capability inventory: The skill can execute shell commands via bash, spawn sub-agents, write files to the local repository, and invoke other skills like
/spec. - Sanitization: No sanitization or filtering logic is present for data ingested from external web sources.
- [COMMAND_EXECUTION]: The skill performs local shell operations to manage the PRD workflow and integrate with the environment.
- Evidence: Uses
mkdir -pandrm -ffor directory and temporary file management. - Evidence: Executes a local binary at
~/.pilot/bin/pilotto retrieve the user's email address for inclusion in the PRD metadata, which is a standard environment integration.
Audit Metadata