speckit-clarify
Warn
Audited by Gen Agent Trust Hub on Mar 11, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Potential command injection in
scripts/check-prerequisites.sh. The script executeseval $(get_feature_paths), whereget_feature_paths(defined inscripts/common.sh) generates shell variable assignments using metadata derived from the file system. Inscripts/common.sh, theget_feature_pathsfunction includesCURRENT_BRANCH='$current_branch'in a heredoc. If a repository branch name or directory in thespecs/folder contains shell metacharacters (e.g.,' ; touch /tmp/pwned ; '), theevalcall incheck-prerequisites.shwill execute the injected commands. - [PROMPT_INJECTION]: Risk of indirect prompt injection during specification scanning. The skill reads the content of
FEATURE_SPEC(typicallyspec.md) inSKILL.mdStep 2 to perform an ambiguity scan. No explicit delimiters or instructions to ignore embedded commands are used when the agent processes the specification content. The skill has the capability to execute local shell scripts (scripts/check-prerequisites.sh) and perform file write operations (FEATURE_SPECupdate in Step 7). There is no evidence of sanitization or filtering applied to the text read from the specification files before it is processed by the LLM.
Audit Metadata