openspec-explore
Pass
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it ingests data from external project artifacts without using boundary markers or sanitization logic.
- Ingestion points: Reads content from
proposal.md,design.md, andtasks.mdwithin theopenspec/changes/directory. - Boundary markers: No delimiters or instructions are provided to the agent to distinguish between its own logic and potentially malicious instructions embedded in those files.
- Capability inventory: The skill has the capability to write to the filesystem (creating/updating artifacts) and execute the
openspecCLI tool. - Sanitization: No sanitization or validation of the ingested file content is performed.
- [COMMAND_EXECUTION]: The skill instructs the agent to execute a specific local CLI tool to gather context about the project state.
- Evidence: Execution of
openspec list --jsonto identify active changes.
Audit Metadata