blueprint-execute
Pass
Audited by Gen Agent Trust Hub on Feb 19, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION] (LOW): The skill is susceptible to indirect prompt injection through its ingestion of the
manifest.jsonfile, particularly in Step 2.5. - Ingestion points:
docs/blueprint/manifest.jsonis parsed to identify 'auto_run' tasks. - Boundary markers: No explicit delimiters or 'ignore' instructions are used when processing the output of the
jqcommand. - Capability inventory: The agent has access to
BashandSlashCommandtools, which are used to execute the tasks identified from the JSON. - Sanitization: While the write-path uses
jq --argto prevent command injection into the file, the read-path does not sanitize keys extracted from the JSON before they are used to influence the agent's task execution logic. This 'schema confusion' surface could allow a malicious file to influence the agent's behavior. - [COMMAND_EXECUTION] (SAFE): The skill uses standard Unix utilities (
git,find,grep,jq) for repository analysis and status checking. These commands are used according to best practices and are limited to the local environment.
Audit Metadata