blueprint-adr-list
Pass
Audited by Gen Agent Trust Hub on Apr 21, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Uses
Bashto runls,fd,awk, andgrepfor file discovery and text parsing within thedocs/adrs/directory. These are standard operations for generating documentation indices. - [PROMPT_INJECTION]: Analyzes local ADR files to extract titles and statuses, which creates a surface for indirect prompt injection if the project files contain malicious instructions.
- Ingestion points: Documentation files in
docs/adrs/*.mdare ingested inSKILL.md. - Boundary markers: Absent; the skill does not explicitly instruct the agent to ignore instructions embedded in the ADR files.
- Capability inventory: Includes
Bashcommands for file system access and text processing as defined inSKILL.md. - Sanitization: Not present; the skill extracts and displays content as-is from the source files.
- [SAFE]: No remote downloads, network exfiltration, or hardcoded credentials were found. The skill operates exclusively on local project documentation.
Audit Metadata