bmad-technical-research
Warn
Audited by Gen Agent Trust Hub on Apr 22, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes a local Python script located at
{project-root}/_bmad/scripts/resolve_customization.pyduring its activation sequence. This execution relies on the integrity of the project environment and the provided script. - [COMMAND_EXECUTION]: The skill is designed to sequentially execute steps defined in
activation_steps_prependandactivation_steps_append. These are loaded fromcustomize.tomland can be overridden by user or team configuration files, allowing the execution of arbitrary instructions or commands stored in external files. - [PROMPT_INJECTION]: The skill possesses a significant surface for indirect prompt injection. Ingestion points: The skill reads local files such as
project-context.mdandconfig.yaml, and it ingests data from numerous web searches conducted throughout the workflow (Steps 2 through 6). Boundary markers: No delimiters or defensive instructions are implemented to prevent the agent from obeying instructions embedded in the ingested data. Capability inventory: The skill has the capability to execute shell commands via the Python script and activation steps, and it can write research reports to the local filesystem. Sanitization: No sanitization or validation of the content retrieved from the web or project files is performed before it is processed or written to the final output documents.
Audit Metadata