sprint-testing-workflow
Pass
Audited by Gen Agent Trust Hub on Apr 23, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill includes multiple Python scripts that utilize
subprocess.callto execute other scripts within the local directory. - Evidence:
scripts/convert_to_csv.py,scripts/parse_excel.py, andscripts/batch_convert_templates.pyusesys.executableto runconvert_formats.pyorparse_formats.py. - These scripts chain local execution to handle file parsing and format conversion (e.g., Markdown to CSV/JSON).
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection as it is specifically designed to ingest and analyze untrusted external data such as user requirements and API documentation.
- Ingestion points:
prompts/requirements-analysis.mdandprompts/api-testing.mdexplicitly instruct the agent to read and analyze external docs, stories, and design notes. - Boundary markers: The prompts do not implement delimiters or specific instructions to disregard potentially malicious commands embedded within the analyzed documents.
- Capability inventory: The agent has access to local scripts in the
scripts/folder that can read from and write to the local filesystem. - Sanitization: No evidence of input sanitization or validation of the ingested data was found in the prompt instructions.
Audit Metadata