sdd-spec
Pass
Audited by Gen Agent Trust Hub on Mar 16, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill ingests untrusted data from a skill registry and existing domain specifications, creating a vulnerability surface for indirect prompt injection.
- Ingestion points: Uses
mem_get_observationto retrieve proposals and specs, and reads.atl/skill-registry.mdfrom the project root. - Boundary markers: The skill uses Markdown headers to structure its output but does not implement explicit boundary markers or instructions to ignore embedded commands in the source data.
- Capability inventory: The skill can persist data via the
mem_savetool and write files to the localopenspec/directory. - Sanitization: No sanitization or validation of the ingested content is performed before it is used to generate new specifications.
- [COMMAND_EXECUTION]: The skill performs file system read and write operations within the project directory and interacts with internal state management tools (
mem_save,mem_search) to persist and retrieve project artifacts.
Audit Metadata