implement
Pass
Audited by Gen Agent Trust Hub on May 2, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATION
Full Analysis
- [PROMPT_INJECTION]: Indirect prompt injection vulnerability. The skill accepts user input via the
$ARGUMENTSvariable and interpolates it directly into the prompt strings used to spawn subagents (e.g., inreferences/agent-phases.md). There are no boundary markers or instructions for the subagents to ignore instructions contained within the feature description, which could allow a malicious user to hijack the subagents' behavior.\n - Ingestion points:
$ARGUMENTSinSKILL.md.\n - Boundary markers: Absent in subagent prompt templates.\n
- Capability inventory:
Bash,Write,Edit,CronCreate,Agent(High capability).\n - Sanitization: None identified.\n- [COMMAND_EXECUTION]: Extensive use of the
Bashtool for project scaffolding, git worktree management (viascripts/worktree-setup.sh), dependency scanning, and test execution across all phases.\n- [EXTERNAL_DOWNLOADS]: The skill performs remote data retrieval usingWebFetchfor documentation (e.g.,docs.example.com) and usescurlorwgetwithin verification scripts to test API endpoints.\n- [DATA_EXFILTRATION]: Employs thePushNotificationtool to transmit feature names and test results to an external notification service upon completion of implementation tasks.
Audit Metadata