overseer-plan

Pass

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
  • Indirect Prompt Injection (LOW): The skill parses user-provided markdown files to extract task data, creating a surface for injection.
  • Ingestion points: File content read from the path provided to the /overseer-plan command.
  • Boundary markers: None specified for the data ingestion; content is parsed directly for headings and lists.
  • Capability inventory: Access to the Overseer MCP API, which includes tasks.create, tasks.update, tasks.delete, and tasks.complete (JavaScript execution).
  • Sanitization: No explicit sanitization of markdown content before interpolation into task descriptions and context.
  • Dynamic Execution (LOW): The agent generates JavaScript code snippets to interact with the Overseer tool based on templates. While this involves dynamic construction of executable calls, it is the primary purpose of the skill and follows a constrained API structure.
  • Oracle Review (Mitigation): The skill implements a security-positive pattern by requiring an 'Oracle' review of the proposed task breakdown before any persistent changes are made to the task database.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 17, 2026, 05:02 PM