ccw-loop
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION] (LOW): The skill interpolates user-controlled task descriptions into the system instructions of a sub-agent, creating a surface for indirect prompt injection.
- Ingestion points: The
taskargument andstate.descriptioninphases/01-session-init.md. - Boundary markers: The
spawn_agentcall inphases/02-orchestration-loop.mduses Markdown headers but lacks explicit 'ignore embedded instructions' delimiters. - Capability inventory: The orchestration logic allows
Bashexecution, file writing, and sub-agent spawning. - Sanitization: No sanitization or validation of the input string is performed.
- [COMMAND_EXECUTION] (SAFE): The skill uses the
Bashtool to execute shell commands for standard development tasks such as identifying the project root and running test frameworks. - Evidence:
Bashcalls inphases/01-session-init.md(git rev-parse) andactions/action-validate.md(npm test, pytest). - [DYNAMIC_EXECUTION] (SAFE): The debug action dynamically modifies source files by injecting NDJSON logging statements for instrumentation.
- Evidence:
actions/action-debug.mdaddsconsole.logstatements to track hypothesis verification. This behavior is purpose-aligned for a debugging tool.
Audit Metadata