flow-next-opencode-plan-review
Warn
Audited by Gen Agent Trust Hub on Apr 7, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill uses
evalto execute shell commands generated by theflowctltool, which is a form of dynamic execution. - Evidence: The skill executes
eval "$($FLOWCTL rp setup-review ...)"in bothworkflow.mdandflowctl-reference.md. - Risk: This pattern can lead to arbitrary command execution if the tool output includes unescaped characters from user-controlled metadata or project content like epic summaries.
- [COMMAND_EXECUTION]: The skill relies extensively on executing local CLI tools and shell scripts to manage project state.
- Evidence: It frequently calls
git,rp-cli, and a bundled tool located at.opencode/bin/flowctlacrossSKILL.mdandworkflow.md. - [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface because it processes untrusted markdown data from project specifications.
- Ingestion points: The skill reads markdown files from
.flow/specs/and.flow/tasks/to build review prompts (as described inworkflow.md). - Boundary markers: The skill attempts to delimit content using markdown headers,
---separators, and<file_contents>XML tags in the generated prompt. - Capability inventory: The skill has the ability to read project files, write updated plan specifications via
flowctl epic set-plan, and modify task specifications. - Sanitization: There is no evidence of sanitization or escaping for the ingested markdown content before it is interpolated into the prompt sent to the LLM backend.
Audit Metadata