skills/wenjunduan/rlues/plan/Gen Agent Trust Hub

plan

Pass

Audited by Gen Agent Trust Hub on May 2, 2026

Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
  • [DYNAMIC_CONTEXT_INJECTION]: The skill utilizes the dynamic context injection syntax to execute shell commands when the skill is loaded by the agent environment.
  • Evidence: !cat .ai_state/project.json 2>/dev/null | head -5 and !head -5 .ai_state/design.md 2>/dev/null in SKILL.md.
  • These commands are used to provide the AI agent with immediate context regarding the project's current status. The operations are limited to reading the first few lines of project-specific state files and do not involve sensitive system directories or network activity.
  • [COMMAND_EXECUTION]: Shell commands (cat, head, grep) are used to interact with local files within the project repository.
  • The cat and head commands are triggered automatically during context injection, while grep is suggested for technical research. These are standard operations for development-oriented agents and are constrained to the project's working directory.
  • [PROMPT_INJECTION]: The skill processes user-provided requirements and incorporates them into project documentation, creating an indirect prompt injection surface.
  • Ingestion points: User requirements are refined and written to .ai_state/design.md in the 'R₀ 需求精炼' section.
  • Boundary markers: The skill does not explicitly define delimiters for untrusted user input within the design documents.
  • Capability inventory: The skill utilizes file system access (read/write), local search (grep), and project state management tools.
  • Sanitization: No explicit sanitization or instruction filtering is described for the ingestion of user requirements.
  • Risk Assessment: This represents a standard attack surface for agents that process user instructions; however, the behavior is integral to the skill's primary purpose of requirement analysis.
Audit Metadata
Risk Level
SAFE
Analyzed
May 2, 2026, 10:37 PM