openspec-to-beads
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (LOW): The skill uses templates in
templates/issue-creation.mdto construct and execute shell commands (e.g.,bd create). It interpolates task descriptions and categories directly from local files (tasks.md) without escaping characters. A malicious project file could use shell metacharacters to execute unauthorized commands. - [PROMPT_INJECTION] (LOW): Vulnerable to indirect prompt injection (Category 8). The skill is instructed to read and 'understand' untrusted content from
openspec/changes/to drive its logic. 1. Ingestion points:tasks.md,proposal.md,spec.md, anddesign.md. 2. Boundary markers: Absent. 3. Capability inventory: Full access tobd(issue tracking) andopenspecCLI tools. 4. Sanitization: Absent; the agent is directed to bridge gaps 'intelligently' without specific safety filters for ingested content.
Audit Metadata