speckit-tasks
Warn
Audited by Gen Agent Trust Hub on Mar 11, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/check-prerequisites.shexecutesevalon the output of theget_feature_pathsfunction defined inscripts/common.sh. Theget_feature_pathsfunction constructs shell variable assignments such asCURRENT_BRANCH='value'. Because these values are derived from environment variables, git branch names, or directory names on the local file system, an attacker could potentially inject arbitrary shell commands by including a single quote and a command separator in one of these strings, thereby breaking out of the quoted assignment duringeval. - [PROMPT_INJECTION]: The skill defines a workflow to create an actionable task list for an agent by reading and processing content from external markdown files like
plan.mdandspec.md. This ingestion process constitutes an indirect prompt injection surface. Ingestion points: The skill reads from multiple documents within theFEATURE_DIRas specified inSKILL.md. Boundary markers: The skill does not implement boundary markers or instructions to ignore instructions embedded within the processed documentation. Capability inventory: The output is designed to be atasks.mdfile for immediate execution by an agent, which typically possesses capabilities like file system access and shell execution. Sanitization: The skill lacks any sanitization or validation of the input text before organizing it into the final task list.
Audit Metadata