openspec-archive-change
Pass
Audited by Gen Agent Trust Hub on Feb 25, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Executes the
openspecCLI tool to list and check the status of workflow changes. - [COMMAND_EXECUTION]: Uses standard shell utilities like
mkdirandmvto manage the local file system during the archival process. - [PROMPT_INJECTION]: Directly interpolates the
<name>variable into shell execution strings (e.g.,openspec status --change "<name>"). This pattern creates a potential command injection vector if the input is not sanitized before execution. - [PROMPT_INJECTION]: Features an indirect prompt injection surface by ingesting and processing data from external files. 1. Ingestion points:
tasks.mdand local specification files. 2. Boundary markers: None identified in the prompt logic. 3. Capability inventory: Shell command execution and file system modification. 4. Sanitization: No explicit validation of file content is performed.
Audit Metadata