gsd-integration-checker
Pass
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it reads and processes data from external milestone summary files (
*-SUMMARY.md) to identify integration points and endpoints for testing. - Ingestion points: Data is ingested from the
.planning/phases/directory viacatandgrepcommands in Step 1 and Step 2. - Boundary markers: Absent. The skill does not use delimiters or instructions to prevent the agent from following malicious commands embedded in the summary files.
- Capability inventory: The skill utilizes
Bash,WebFetch(viacurl), and database tools (npx prisma), which could be leveraged if the agent is misled by injected content. - Sanitization: Absent. There is no evidence of validation or escaping for the URLs or parameters extracted from the untrusted summary files.
- [COMMAND_EXECUTION]: The skill performs several command-line operations that interact with the system and environment.
- Uses
bashto search the filesystem (find), read files (cat), and search for patterns (grep). - Executes
npx prisma studio executein Step 6 to run database queries. If table names or query parameters are influenced by the milestone context, this could lead to unauthorized data access. - [DATA_EXFILTRATION]: The skill contains logic designed to access and test sensitive credentials, which creates an exposure surface.
- Step 3 explicitly instructs the agent to search for
API_KEY,SECRET, andTOKENwithin the source code (src/api/external-service/route.ts). - The use of
curlto test endpoints allows for data to be sent to external or local services. If an attacker-controlled milestone summary specifies a malicious URL, the agent could inadvertently exfiltrate configuration data or secrets during the verification process.
Audit Metadata