feature-manifest
Pass
Audited by Gen Agent Trust Hub on Mar 5, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses
Bash(npm:*,npx:*)to execute local project scripts such asnpm run feature:validateandnpm run feature:health. While these are standard development workflows, the broad permission allows execution of any script defined in the project'spackage.jsonor any package vianpx. - [DATA_EXFILTRATION]: The manifest schema explicitly encourages tracking sensitive configuration metadata in fields like
dependencies.env_varsanddependencies.secrets. While it tracks names rather than values in the examples, this creates a centralized map of sensitive assets within the codebase which could be targeted or accidentally exposed in agent outputs. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection.
- Ingestion points: The agent is instructed to read manifest files (e.g.,
feature-id.yaml) which include free-textdescriptionandchangelogfields. - Boundary markers: There are no explicit instructions or delimiters defined to prevent the agent from following instructions embedded within these manifest files.
- Capability inventory: The agent has
Read,Write,Edit, andBashcapabilities, which could be abused if it obeys instructions found inside a manifest. - Sanitization: There is no evidence of sanitization or validation of the content within the manifest descriptions before the agent processes them.
Audit Metadata