speckit-orchestrator
Pass
Audited by Gen Agent Trust Hub on Apr 21, 2026
Risk Level: SAFEPROMPT_INJECTIONNO_CODE
Full Analysis
- [PROMPT_INJECTION]: The skill defines an attack surface for indirect prompt injection by processing external, potentially untrusted project artifacts.
- Ingestion points: The orchestrator is designed to read and process content from
.specify/memory/constitution.md,spec.md,plan.md, andtasks.mdas specified in the workflow steps inSKILL.mdandmodules/progress-tracking.md. - Boundary markers: No explicit delimiters or instructions to ignore embedded commands (e.g., 'treat following text as data only') are present in the logic used to ingest these files.
- Capability inventory: The skill facilitates the execution of implementation tasks derived from the
tasks.mdfile via the/speckit-implementcommand mapping inmodules/command-skill-matrix.mdandmodules/progress-tracking.md. - Sanitization: There is no documented logic for validating, sanitizing, or escaping the content of these external files before they influence the agent's workflow transitions or task execution logic.
- [NO_CODE]: No executable scripts (.sh, .py, .js) or binary files are included in this skill. The orchestration logic is entirely described through markdown instructions and metadata modules.
Audit Metadata