bmad
Fail
Audited by Gen Agent Trust Hub on Mar 29, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The
scripts/install.shfile contains a command that fetches a shell script fromhttps://plannotator.ai/install.shand pipes it directly tosh. This allows for the execution of unverified remote code from an external source without integrity checks. - [COMMAND_EXECUTION]: The skill uses
python3 -cwithin shell scripts (scripts/check-status.sh,scripts/phase-gate-review.sh) to execute inline Python code for YAML parsing and submission logic. This involves dynamic execution of code constructed from string templates. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection as it ingests untrusted data from project documentation files.
- Ingestion points: The
scripts/phase-gate-review.shscript reads the content of documents such as PRDs and architecture specifications from thedocs/directory. - Boundary markers: The skill does not use any delimiters or explicit instructions to the model to ignore potential directives embedded within the processed documents.
- Capability inventory: The skill has access to tools like
Bash,Write, andRead, and it executes multiple logic-heavy scripts based on the workflow state. - Sanitization: There is no evidence of content sanitization or validation of the markdown/YAML files before they are read and processed into the agent's context.
Recommendations
- HIGH: Downloads and executes remote code from: https://plannotator.ai/install.sh - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata