bmad-quick-dev
Pass
Audited by Gen Agent Trust Hub on Mar 14, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill frequently executes shell commands to manage development state. Specifically, it uses
git rev-parseto capture baseline commits andgit diffto generate code reviews instep-01-mode-detection.mdandstep-05-adversarial-review.md. It also explicitly instructs the agent to run project-specific test suites instep-03-execute.mdandstep-04-self-check.md, which involves executing arbitrary code defined within the project environment. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because it ingests and processes content from external files (tech-specs and project-context) that could contain malicious instructions.
- Ingestion points: The skill loads a user-specified file path as a tech-spec in
step-01-mode-detection.mdand reads existing code/documentation for context instep-02-context-gathering.md. - Boundary markers: The instructions do not define strict delimiters or 'ignore' instructions for the content being read from these files.
- Capability inventory: The agent has the capability to write files to the project directory and execute shell commands (Git, tests) as seen in
step-03-execute.mdandstep-05-adversarial-review.md. - Sanitization: No sanitization or validation logic is applied to the content of the tech-specs or project context files before they influence the agent's task list and implementation plan.
- [DATA_EXPOSURE]: In
step-01-mode-detection.md, the skill accepts an arbitrary file path from the user to be loaded as a 'tech-spec'. If the agent is not constrained by its environment, this mechanism could be abused to read sensitive files (e.g., configuration secrets or SSH keys) if they are passed as the tech-spec path.
Audit Metadata