planning-with-files
Pass
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes local shell scripts included in the package to manage the task lifecycle.
scripts/init-session.shinitializestask_plan.md,findings.md, andprogress.mdin the user's project directory.scripts/check-complete.shis executed via theStophook to count completed phases in the plan file usinggrep.- [PROMPT_INJECTION]: The skill has an indirect prompt injection surface due to its context-refreshing mechanism.
- Ingestion points: The
PreToolUsehook forWrite,Edit, andBashtools executescat task_plan.md 2>/dev/null | head -30 || true, injecting the start of the plan file directly into the agent's recent context. - Boundary markers: There are no protective delimiters or instructions to the model to ignore embedded commands within the echoed file content.
- Capability inventory: The agent has access to sensitive tools including
Bash,Write, andWebFetch. - Sanitization: No filtering or escaping is applied to the content of
task_plan.mdbefore it is presented to the model.
Audit Metadata