kata-track-progress
Pass
Audited by Gen Agent Trust Hub on Apr 10, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses shell commands (bash) to interact with the local file system, verifying directory structures and counting files using tools like
find,wc, andgrep. - [COMMAND_EXECUTION]: It interacts with the GitHub CLI (
gh) to fetch Pull Request status, including titles, numbers, and states (draft, merged, open) for the current branch. - [COMMAND_EXECUTION]: The skill executes a local script
scripts/kata-lib.cjsusing Node.js to perform roadmap validation and configuration reading. - [PROMPT_INJECTION]: The skill is subject to indirect prompt injection risks because it ingests and summarizes untrusted data from project files and source code.
- Ingestion points: Project management files (e.g.,
STATE.md,ROADMAP.md,SUMMARY.md) and the entire codebase during mapping. - Boundary markers: Uses markdown headers and code blocks to separate file content, but lacks explicit "ignore embedded instructions" warnings for the agent.
- Capability inventory: Access to shell execution (bash), file system read/write, and the ability to invoke other skills like
kata-doctor. - Sanitization: No explicit sanitization or filtering of external content is mentioned before it is processed and presented in reports.
Audit Metadata