kata-inserting-phases
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (MEDIUM): The
generate_slugstep uses the Bash commandecho "$description". Because the$descriptionvariable contains raw user input from the command arguments, a user could provide a description containing shell subshells or backticks (e.g.,$(whoami)) to execute arbitrary code within the agent's terminal environment before the sanitization logic is applied. - [PROMPT_INJECTION] (LOW): The skill is susceptible to indirect prompt injection by processing external data.
- Ingestion points: Reads project roadmap data from
.planning/ROADMAP.mdin theload_roadmapstep. - Boundary markers: None. The skill reads the entire file content into context without using delimiters or instructions to ignore embedded commands.
- Capability inventory: Uses
Bash(mkdir, echo, sed, tr, printf),Write(updating ROADMAP.md and STATE.md), andRead(file inspection). - Sanitization: The skill applies a kebab-case slugging process using
sedto sanitize directory names, but it does not sanitize or escape thedescriptionvariable before writing it into theROADMAP.mdorSTATE.mdfiles.
Audit Metadata