analyze-architecture

Warn

Audited by Gen Agent Trust Hub on Mar 17, 2026

Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
  • [REMOTE_CODE_EXECUTION]: The skill attempts to execute external Python scripts located at '.claude/skills/bmad-commands/scripts/extract_tech_stack.py' and 'validate_metrics.py'. These dependencies are outside of the skill's own package and their source or integrity cannot be verified, creating a risk of executing unverified code if the target path is compromised.
  • [COMMAND_EXECUTION]: Uses 'npx tsc --noEmit' to analyze codebase quality. Executing a compiler or build tool like 'tsc' on an untrusted codebase is a risk factor, as it may interact with malicious configuration files (e.g., 'tsconfig.json') or local 'node_modules' in a way that leads to arbitrary code execution.
  • [DATA_EXFILTRATION]: The skill explicitly searches for and reads sensitive information, including strings like 'AWS_SECRET', 'API_KEY', and 'PASSWORD', as well as scanning '.env' files. While intended for security analysis, this behavior exposes credentials to the agent's context and incorporates them into the generated analysis report.
  • [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection. (1) Ingestion points: Reads files from the target codebase root, including source code, configuration files, and documentation. (2) Boundary markers: None identified; untrusted codebase content is processed directly by commands without delimiters or safety instructions. (3) Capability inventory: Execution of shell commands (find, grep, cat), execution of Python scripts, and generation of local markdown/JSON report files. (4) Sanitization: No evidence of sanitization or validation of the content read from the target codebase before it is used in further commands or report generation.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 17, 2026, 05:56 AM