bpmn-architect
Pass
Audited by Gen Agent Trust Hub on Feb 18, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- Indirect Prompt Injection (LOW): The skill processes untrusted user data through the
structured_dataparameter. - Ingestion points:
src/index.tsacceptscontext,bpmn_ingredients, andlogic_flowasz.any()types. - Boundary markers: None detected. The system prompt in
src/prompt.tsdoes not use delimiters to isolate user input. - Capability inventory: The skill requests
Bash,Read, andWritetools inSKILL.md. - Sanitization: Input data is not sanitized or validated against a strict schema beyond the top-level object structure.
- Command Execution (LOW): The skill metadata in
SKILL.mdrequests theBashtool. While no malicious scripts are present in the provided files, granting shell access to a skill that processes untrusted external data increases the risk of successful exploitation if a prompt injection occurs.
Audit Metadata