design-implementation
Pass
Audited by Gen Agent Trust Hub on Apr 19, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill manages development servers by executing shell-level commands.
- Evidence:
tools/server-manager.tsusesBun.spawnto launch server commands (e.g.,bun run dev) and useskillto terminate processes identified vialsof. - Scope: Execution is limited to scripts defined in the project's
package.jsonor provided via user-supplied CLI arguments for server management. - [EXTERNAL_DOWNLOADS]: The skill interacts with local and external network resources for verification and design fetching.
- Evidence:
tools/playwright-runner.tsautomates browser sessions to visit local or remote URLs to capture screenshots and logs. - Evidence:
workflows/implement-feature.mdoutlines integration with the Figma API to retrieve design specifications. - [PROMPT_INJECTION]: The skill possesses an attack surface for Indirect Prompt Injection (Category 8) due to its processing of untrusted external content.
- Ingestion points: The skill ingests data from Figma APIs, web page console logs, and rendered UI screenshots.
- Boundary markers: Visual verification prompts (e.g., in
workflows/verify-visual.md) do not include explicit instructions to the vision model to ignore instructions embedded within the screenshots or logs. - Capability inventory: The agent has access to subprocess execution (
Bun.spawn), file system modifications, and browser automation. - Sanitization: There is no evidence of sanitization for error logs or text extracted from web pages before they are used to influence the development loop logic.
Audit Metadata