workflow-quality-audit
Warn
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill's workflow depends on executing shell commands defined in the configuration, specifically via the
items.apiandevidence.capturefields. There is no validation or sanitization of these commands before execution. - [REMOTE_CODE_EXECUTION]: The
reportingstep uses thebdtool to post comments. The commandbd comment {item.id} --body "{verdict}"interpolates values that may originate from untrusted external sources (item metadata or audit results) without escaping, creating a risk of shell command injection. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection as it processes untrusted data (audit items, standards documents, and evidence artifacts) and uses it to drive the evaluation logic without defined boundary markers or sanitization.
- Ingestion points: Item lists from
items.apior files,standards.doc, and various evidence types such assource-readandtest-runoutputs inSKILL.md. - Boundary markers: Absent. The pipeline does not implement delimiters or instructions to ignore embedded commands within the ingested evidence.
- Capability inventory: The skill has access to
Bash,Read,Write,Edit,Glob,Grep, andTasktools, which are active during the ingestion and evaluation phases. - Sanitization: Absent. There is no evidence of input validation, output escaping, or content filtering for data processed during the audit workflow.
Audit Metadata