openspec-continue-change
Pass
Audited by Gen Agent Trust Hub on May 13, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill legitimately executes the
openspecCLI tool (e.g.,openspec status,openspec list,openspec instructions) to retrieve project metadata and state. These commands are necessary for the skill's stated purpose of managing development workflows. - [DATA_ACCESS]: The skill reads project files identified as 'dependencies' and writes new files to the
outputPathprovided by the CLI. This behavior is restricted to the local project environment and aligns with the expected function of an artifact creation tool. - [INDIRECT_PROMPT_INJECTION]: The skill has a surface for indirect prompt injection as it ingests untrusted data from external sources.
- Ingestion points: The skill parses JSON output from the
openspecCLI (specifically thecontext,rules, andinstructionfields) and reads the content of existing project files marked as dependencies. - Boundary markers: No explicit delimiters or 'ignore' instructions are used to wrap the data retrieved from the CLI or files.
- Capability inventory: The skill has the capability to execute shell commands (
openspec), read local files, and write local files. - Sanitization: There is no evidence of sanitization or validation of the content retrieved from external files before it is processed by the agent.
- Risk Assessment: While the attack surface exists, the risk is inherent to the tool's purpose of following project specifications. The prompt includes instructions to use
contextandrulesas constraints rather than directly copying them, which acts as a logical barrier.
Audit Metadata