milestone-execute
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [Indirect Prompt Injection] (HIGH): The skill processes external content from files like
SPEC.md,milestone.md, andplan.mdto drive its logic. - Ingestion points:
SPEC.md,milestone.md,plan.md, andsurvey.mdin the project root. - Boundary markers: Absent. The instructions do not specify any delimiters or warnings to ignore embedded instructions within these data files.
- Capability inventory: The skill executes shell commands (
pnpm typecheck,pnpm run lint) and delegates code implementation to sub-agents which have file-writing capabilities. - Sanitization: Absent. The skill treats the content of these files as trusted structural data for generating implementation tasks.
- [Command Execution] (MEDIUM): The skill automatically executes shell commands (
pnpm) based on the outcome of the implementation phase. While these are standard development tools, an attacker-controlledpackage.jsonormilestone.mdcould potentially influence the environment or lead to code execution during the verification step.
Recommendations
- AI detected serious security threats
Audit Metadata