update-tests
Warn
Audited by Gen Agent Trust Hub on Feb 28, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill interpolates user-controlled variables
{FeatureName}and{base}directly into shell commands such asgit diff,git show, andgrep. This creates a command injection vulnerability if malicious strings are supplied via the--sinceargument or the.last-syncmetadata file. - [COMMAND_EXECUTION]: The
{FeatureName}parameter is used to construct file paths without validation, which could enable path traversal attacks to read or write files outside the intended directory. - [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface by reading feature documentation to determine how to generate or modify test code. Adversarial instructions embedded in the documentation could manipulate the agent's output.
- Ingestion points:
docs/test-specs/{FeatureName}/README.mdand.last-sync. - Boundary markers: Absent; the skill does not use delimiters or warnings to ignore instructions within the documentation.
- Capability inventory:
Bash(git),Write/Edit(file updates). - Sanitization: Absent; documentation content is not sanitized or validated before being used to influence code generation.
Audit Metadata