openspec-archive-change

Pass

Audited by Gen Agent Trust Hub on Feb 25, 2026

Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: Executes the openspec CLI tool to list and check the status of workflow changes.
  • [COMMAND_EXECUTION]: Uses standard shell utilities like mkdir and mv to manage the local file system during the archival process.
  • [PROMPT_INJECTION]: Directly interpolates the <name> variable into shell execution strings (e.g., openspec status --change "<name>"). This pattern creates a potential command injection vector if the input is not sanitized before execution.
  • [PROMPT_INJECTION]: Features an indirect prompt injection surface by ingesting and processing data from external files. 1. Ingestion points: tasks.md and local specification files. 2. Boundary markers: None identified in the prompt logic. 3. Capability inventory: Shell command execution and file system modification. 4. Sanitization: No explicit validation of file content is performed.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 25, 2026, 12:49 AM