ce-plan
Pass
Audited by Gen Agent Trust Hub on Mar 27, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes various shell commands to manage files and sequence numbers.
- Evidence:
ls -la docs/brainstorms/*.md,mkdir -p docs/plans/, andnext_seq=$(printf "%03d" $(( ${last_seq:-0} + 1 ))). - [COMMAND_EXECUTION]: The skill interacts with external project management tools using installed CLI utilities.
- Evidence: Uses
gh issue createfor GitHub andlinear issue createfor Linear integrations. - [DATA_EXFILTRATION]: The skill contains a feature to share the generated markdown plan with an external web service.
- Evidence: Executes a
curlPOST request tohttps://www.proofeditor.ai/share/markdowncontaining the full content of the generated plan file. While this is a documented feature, it involves sending potentially sensitive project details to a third-party domain. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection as it processes untrusted input and local files.
- Ingestion points: Accepts user-provided feature descriptions via
#$ARGUMENTSand reads existing brainstorm documents fromdocs/brainstorms/. - Boundary markers: Uses
<feature_description>tags for user input, which provides basic delimitation but may be bypassed by sophisticated instructions. - Capability inventory: The skill has significant capabilities, including file system access (read/write), network access (via
curl), and the ability to trigger other agent tasks. - Sanitization: There is no explicit evidence of sanitization or filtering of the input before it is used to inform the planning process or passed to other agents.
Audit Metadata