bmad-orchestrator
Pass
Audited by Gen Agent Trust Hub on Feb 22, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION] (LOW): Ingestion of user-defined metadata in configuration files creates a surface for indirect prompt injection.
- Ingestion points: Project configuration data is read from
bmad/config.yamlanddocs/bmm-workflow-status.yaml. - Boundary markers: Absent; strings are interpolated into templates without delimiters or warnings.
- Capability inventory: File creation and modification (mkdir, sed) and status display via echo.
- Sanitization: Absent; no escaping or validation of inputs for shell or template injection.
- [COMMAND_EXECUTION] (LOW): The skill utilizes bash scripts for project automation. These scripts perform expected file operations but rely on dynamic string interpolation of unvalidated project metadata.
Audit Metadata