skills/lv416e/dotfiles/brainstorming/Gen Agent Trust Hub

brainstorming

Pass

Audited by Gen Agent Trust Hub on Feb 12, 2026

Risk Level: LOWNO_CODE
Full Analysis

The skill SKILL.md is a markdown file providing detailed instructions for an AI agent to conduct a brainstorming and design process. It outlines phases, activities, and interaction patterns with a human partner.

  1. Prompt Injection: No patterns indicative of prompt injection (e.g., 'IMPORTANT: Ignore', 'CRITICAL: Override', jailbreak attempts) were detected. The skill's language is instructional, guiding the AI's behavior within its defined scope without attempting to subvert core safety or system instructions.

  2. Data Exfiltration: The skill explicitly mentions the use of 'Native tools (ls, cat, git log, etc.)' for 'Prep: Autonomous Recon' on 'repo/docs/commits'. While cat is a file system read command, its use is directed towards project-related files for analysis, which is consistent with the skill's stated purpose. The skill itself does not instruct the AI to read sensitive files or exfiltrate data to external servers. Any potential misuse of cat to access sensitive files would stem from a malicious user providing an indirect prompt injection to the agent, rather than from the skill's own instructions.

  3. Obfuscation: No obfuscation techniques such as Base64 encoding, zero-width characters, Unicode homoglyphs, URL/hex encoding, or HTML entities were found within the skill's content.

  4. Unverifiable Dependencies: The skill references other internal skills (e.g., elements-of-style:writing-clearly-and-concisely, superpowers:using-git-worktrees, superpowers:writing-plans). These are references to other components within the agent's ecosystem and are not external, unverifiable code downloads or package installations. Therefore, they do not pose a risk as 'unverifiable dependencies' in the context of external code execution.

  5. Privilege Escalation: No commands or instructions that would lead to privilege escalation (e.g., sudo, doas, chmod +x, chmod 777, or modification of system files) were detected.

  6. Persistence Mechanisms: No instructions for establishing persistence mechanisms (e.g., writing to shell configuration files like .bashrc, creating cron jobs, or modifying systemd/LaunchAgent configurations) were found.

  7. Metadata Poisoning: The skill's name and description in the YAML front matter are benign and do not contain any malicious instructions or hidden content.

  8. Indirect Prompt Injection: As an interactive skill designed to process external project files (repository content, documentation, commit history) and user input, it is inherently susceptible to indirect prompt injection if malicious content is embedded within the processed data or if the human partner provides malicious instructions. This is a general risk for any AI agent interacting with external, untrusted data, and not a specific vulnerability introduced by this skill's code.

  9. Time-Delayed / Conditional Attacks: No patterns indicating time-delayed or conditional malicious behavior (e.g., date/time checks, usage counters, environment-specific triggers for harmful actions) were detected.

Conclusion: The skill is a descriptive set of instructions for the AI's behavior and does not contain any executable code. It does not introduce new vulnerabilities or malicious functionality. The use of native tools like cat is for its intended purpose of project analysis, and any potential misuse would originate from external malicious prompts rather than the skill itself.

Audit Metadata
Risk Level
LOW
Analyzed
Feb 12, 2026, 04:22 PM