jdi
Warn
Audited by Gen Agent Trust Hub on Mar 6, 2026
Risk Level: MEDIUMPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection during its orchestration flow. In the
runcommand, the orchestrator retrieves task context (subject and description) from external backends like Beads or Claude Tasks and interpolates this data directly into the instructions for sub-agents without using boundary markers, delimiters, or sanitization. This provides an attack surface where malicious task content could hijack sub-agent behavior. Additionally, theapply-lessonscommand extracts 'lessons' from agent logs and converts them into persistent behavioral rules inCLAUDE.mdor.claude/rules/. If these logs are poisoned by injected content, it could lead to the persistent modification of the agent's core instructions. - [COMMAND_EXECUTION]: The orchestrator relies on the
Bashtool for several critical operations, including lock management in.jdi/locks/, state tracking via the.jdi/statusfile, and extracting decision keywords from agent outputs using utilities liketailandgrep. The includedjust-do-it.shscript also uses shell commands to manage the agent's execution loop. - [EXTERNAL_DOWNLOADS]: The
initcommand and sample skill templates reference external dependencies, such as the 'Beads' CLI tool, as prerequisites for specific task-management backends.
Audit Metadata