backlog
Pass
Audited by Gen Agent Trust Hub on Feb 23, 2026
Risk Level: SAFEPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION] (LOW): The
groom.shscript is susceptible to indirect prompt injection because it parses untrusted data from backlog files to perform filesystem operations.\n - Ingestion points:
groom.shprocesses all.mdfiles in thebacklog/directory andbacklog/ROADMAP.md.\n - Boundary markers: No delimiters or warnings are used to prevent the script from processing maliciously crafted content as legitimate instructions.\n
- Capability inventory: The script executes
git logandgit branchand performs filesystem existence checks ([[ -e \"$filepath\" ]]). This enables an attacker to confirm whether specific files exist on the host by placing those paths in the 'Files to create' section of a backlog file.\n - Sanitization: There is no validation or sanitization of the file paths or keywords extracted from the backlog files before they are used in commands.
Audit Metadata