skill-status-sync
Warn
Audited by Gen Agent Trust Hub on Feb 25, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses the Bash tool to execute system commands including
jq,grep,date, andmv. These commands are used to manipulate local project files (state.jsonandTODO.md) and manage task states.- [REMOTE_CODE_EXECUTION]: The skill dynamically assembles shell commands andjqfilter strings by interpolating template variables like{task_number},{target_status}, and{artifact_path}directly into the script body. While some sections use the saferjq --argflag, others (specifically in thepostflight_updateandartifact_linkoperations) place these variables directly within single-quoted filter strings. This creates a risk of command injection if the input variables contain single quotes or other shell metacharacters.- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection (Category 8) due to its data processing flow. - Ingestion points: Reads content from
specs/state.jsonandspecs/TODO.mdusingjqandgrep. - Boundary markers: No delimiters or 'ignore embedded instructions' warnings are present to isolate the task data from the agent's logic.
- Capability inventory: Uses
Bash,Edit, andReadtools to modify files and execute logic based on the ingested content. - Sanitization: There is no explicit sanitization or validation of the data read from the task files before it is used to influence further operations.
Audit Metadata