architect
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- COMMAND_EXECUTION (LOW): The skill utilizes
bashto execute commands likejqandcatfor reading configuration and memory files within the.specweave/directory. - Evidence:
jq -r '.planning.deepInterview.enabled // false' .specweave/config.jsonandcat .specweave/skill-memories/architect.md. - PROMPT_INJECTION (LOW): The skill is susceptible to indirect prompt injection (Category 8) because it ingests data from local configuration and memory files that might be modified by an attacker.
- Ingestion points:
.specweave/config.json,.specweave/skill-memories/architect.md. - Boundary markers: Absent. The skill reads raw output from
jqandcatdirectly into its context. - Capability inventory: The skill has
Read,Write, andEditpermissions, and the ability to chain to other domain-specific skills (e.g.,sw-backend,sw-infra). - Sanitization: Absent. The content of the memory/config files is not validated or escaped before being processed by the LLM.
Audit Metadata