verification-rules
Pass
Audited by Gen Agent Trust Hub on Apr 2, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill defines verification steps using shell commands like
git statusandgrepthat interpolate variables such as{taskId},{file1}, and{specName}. This pattern is susceptible to command injection if these identifiers are not properly sanitized before being passed to the shell. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because it processes
workerOutputand file content to determine completion status. An attacker could craft output that includes the required 'TASK_COMPLETE' signal while embedding malicious instructions. - [PROMPT_INJECTION_EVIDENCE]:
- Ingestion points: The skill reads
workerOutputand the contents of./specs/{specName}/tasks.md. - Boundary markers: No delimiters or isolation instructions are present to distinguish between data and instructions.
- Capability inventory: The skill facilitates shell command execution via
git,grep, andnpmscripts (lint,test,build). - Sanitization: No sanitization or escaping mechanisms are defined for variables interpolated into shell commands.
Audit Metadata