sprint-plan
Pass
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes a shell command (
ls) within the YAML frontmatter'scontextfield to retrieve a list of existing sprint files from theproduction/sprints/directory. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection due to its reliance on external data sources for generating sprint plans.
- Ingestion points: Reads content from
production/milestones/,production/sprints/,design/gdd/, andproduction/risk-register/. - Boundary markers: The instructions do not define delimiters or provide 'ignore embedded instructions' warnings for the data ingested from these files.
- Capability inventory: The skill is granted
WriteandEdittools, meaning an attacker who can modify design docs or risk registers could potentially trick the agent into performing unauthorized file modifications. - Sanitization: No input validation or filtering is performed on the content retrieved from the file system before it is processed by the agent.
Audit Metadata