kata-complete-milestone
Warn
Audited by Gen Agent Trust Hub on Apr 10, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill performs dynamic execution by retrieving shell commands from the
pre_release_commandsarray in.planning/config.jsonand executing them usingevalwithin themilestone-complete.mdworkflow. This allows for arbitrary command execution based on local project configuration. - [COMMAND_EXECUTION]: The skill uses
evalto execute the output ofscripts/manage-worktree.sh, a local utility script used for managing git worktrees. - [COMMAND_EXECUTION]: The skill makes extensive use of bash commands for git operations (checkout, tag, push), file system management (find, sed, awk, cat), and GitHub CLI interactions (gh pr create, gh release create, gh api).
- [REMOTE_CODE_EXECUTION]: The skill executes
npm test, which runs arbitrary scripts defined within the project'spackage.jsonfile. This represents an execution of code that may be controlled by project dependencies or previous project state. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection (Category 8). It ingests potentially untrusted data from project files and history to generate automated content.
- Ingestion points:
.planning/ROADMAP.md,.planning/REQUIREMENTS.md, and git commit messages. - Boundary markers: Not consistently employed when extracting phase summaries or accomplishments.
- Capability inventory: The skill has the ability to write to the file system, perform git commits/tags, and create GitHub Pull Requests and Releases.
- Sanitization: No explicit sanitization or escaping of the ingested markdown content is performed before it is interpolated into PR bodies or archive files.
Audit Metadata