kata-remove-phase
Warn
Audited by Gen Agent Trust Hub on Apr 10, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill performs destructive file system operations including
rm -rfandmv. These operations rely on variables (${PHASE_DIR},${SRC}) derived from searching the file system and parsing project documents likeROADMAP.mdandSTATE.md. There is a risk of unintended file deletion if paths are maliciously crafted or incorrectly parsed. - [COMMAND_EXECUTION]: The skill executes a local Node.js script (
node scripts/kata-lib.cjs) and invokes another skill (kata-doctor). This assumes the presence and security of local project scripts which are not verified by the skill itself. - [PROMPT_INJECTION]: The skill exhibits an Indirect Prompt Injection surface (Category 8).
- Ingestion points: The skill reads and parses data from
.planning/ROADMAP.mdand.planning/STATE.mdto determine which phases to remove and renumber. - Boundary markers: No delimiters or instructions to ignore embedded commands are present when processing the contents of these files.
- Capability inventory: The agent has capabilities to delete directories (
rm -rf), move files/directories (mv), and commit changes to version control (git commit). - Sanitization: There is minimal sanitization of data read from external files before it is used in shell commands. The use of
findandgrepon user-controlled or file-derived strings without strict escaping presents a command injection surface.
Audit Metadata