blueprint-generate-rules
Pass
Audited by Gen Agent Trust Hub on Apr 21, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [DATA_EXFILTRATION]: The skill uses
sha256sumto compute hashes of PRD files and stores them in a manifest file. While these hashes are used for integrity checks, a user should ensure the source documents do not contain sensitive data that shouldn't be hashed or indexed. - [COMMAND_EXECUTION]: The skill uses
jqto perform complex updates on a JSON manifest file using shell redirection (> tmp.json && mv tmp.json). While it uses--argfor some variables, it relies on environment variables like$PRDS_READand$RULES_GENERATEDwhich are derived from file system operations. - [DATA_EXFILTRATION]: The skill processes untrusted content from the
docs/prds/directory. If an attacker can influence the content of these PRDs, they could potentially inject instructions that the agent would follow during the rule generation phase (Indirect Prompt Injection). - Ingestion points: Reads all
.mdfiles indocs/prds/using Glob and Read tools. - Boundary markers: None identified; PRD content is parsed and aggregated directly into new rule files.
- Capability inventory: Uses Bash (
ls,jq,mv,sha256sum), Glob, Read, and Write tools. - Sanitization: No specific sanitization or escaping of the PRD content is described before it is written into rule files or processed by the agent.
Audit Metadata