team-lifecycle-v4
Pass
Audited by Gen Agent Trust Hub on Apr 17, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection due to the way it processes untrusted external data.
- Ingestion points: Untrusted data enters the agent context through the initial task description in
SKILL.md, user feedback strings inroles/executor/commands/fix.md, and the results of recursive codebase exploration (@**/*) inroles/analyst/role.mdandroles/planner/role.md. - Boundary markers: While the prompt templates in
roles/executor/commands/implement.mdandroles/writer/role.mduse structural headers (e.g., "PURPOSE:", "TASK:", "CONTEXT:"), they lack robust delimiters like triple-backticks or XML tags for interpolated variables, and they do not include explicit instructions to ignore embedded commands within those variables. - Capability inventory: The skill possesses powerful capabilities that could be abused if an injection succeeds, including arbitrary shell command execution via the
Bashtool, file modification viaWrite/Edit, and the ability to spawn new autonomous sub-agents with theAgenttool. - Sanitization: There is no evidence of string sanitization or validation to neutralize potentially malicious instructions within the ingested data before interpolation.
- [COMMAND_EXECUTION]: The skill frequently uses the
Bashtool to perform essential tasks such as running test suites (vitest,jest,pytestinroles/tester/role.md) and invoking platform-specific delegation tools (maestro delegatein multiple role files). This usage is consistent with the skill's purpose as an automated developer but provides an execution path for injected instructions. - [DATA_EXFILTRATION]: To perform its primary function, the skill performs deep codebase exploration. In
roles/analyst/role.mdandroles/planner/role.md, it uses themaestro delegatetool with a global context (@**/*), which results in the agent reading all files in the project workspace. If sensitive files like.env,.ssh, or AWS credentials are present and not explicitly excluded by the platform's tool configuration, they would be accessible to the agent.
Audit Metadata