spec-driven-verify
Pass
Audited by Gen Agent Trust Hub on Mar 26, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes shell commands using
lsandnodeto check directory existence and run internal logic scripts located in the{{SKILL_DIR}}/scripts/directory. These scripts perform the bulk of the verification work. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because it ingests and processes untrusted data from multiple files within the project's
.spec-driven/directory to generate its final report. - Ingestion points:
SKILL.mdreads content from.spec-driven/changes/<name>/questions.md,.spec-driven/specs/,.spec-driven/config.yaml,.spec-driven/changes/<name>/proposal.md, and various specification delta files. - Boundary markers: The skill does not use explicit boundary markers or instructions to ignore embedded commands when reading these external files.
- Capability inventory: The skill possesses file-read capabilities and the ability to execute subprocesses via the
nodescripts. - Sanitization: There is no evidence of sanitization, filtering, or validation of the content read from the project files before it is interpreted by the agent to create the tiered report.
Audit Metadata