blueprint-prp-execute
Warn
Audited by Gen Agent Trust Hub on Apr 21, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes dynamic context injection (
!command) to execute shell commands when the skill is loaded into the agent context. The user-provided PRP name argument is interpolated directly into these shell commands without sanitization, leading to a command injection vulnerability. Evidence:!grep -m1 "^confidence:" docs/prps/${1:-unknown}.mdand!find . -maxdepth 1 -name 'docs/prps/${1:-unknown}.md'inSKILL.md.- [COMMAND_EXECUTION]: The skill's primary workflow involves parsing and executing arbitrary shell commands from external markdown files (PRPs). This allows for code execution if a user processes a malicious PRP file from an untrusted source. Evidence:Linting gate: [command from PRP]andStep 4: Run comprehensive final validationinSKILL.md.- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it ingests implementation requirements from external PRP files and documentation to drive its logic and code generation. 1. Ingestion points:docs/prps/{prp-name}.md,ai_docsentries. 2. Boundary markers: No delimiters or warnings are used to isolate untrusted content. 3. Capability inventory: The skill has access to high-privilege tools includingBash,Task,Write, andEdit. 4. Sanitization: No input validation or sanitization is performed on the ingested content.
Audit Metadata