superspec-plan
Fail
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [Indirect Prompt Injection] (HIGH): The skill extracts content from untrusted external files (
specs/**/spec.md) and interpolates it into generated files that define executable behavior. Specifically, it pullsVerify Commandstrings from scenario test obligations and writes them intotasks.md. An attacker can craft a malicious specification that includes dangerous shell commands (e.g., data exfiltration or system modification) in these fields. Ingestion points:proposal.mdandspecs/**/spec.md. Boundary markers: None present; the skill blindly trusts the content of the specifications. Capability inventory: Executes theopenspecCLI and performs file write operations (design.md,tasks.md). Sanitization: None; the skill does not validate or escape the extracted command strings before outputting them. - [Command Execution] (MEDIUM): The skill performs multiple subprocess calls to the
openspecCLI tool. It uses the output of these commands to determine file write paths (outputPath). If the CLI tool is compromised or its input (changename) is manipulated to return a malicious path, the agent could be tricked into overwriting sensitive system files.
Recommendations
- AI detected serious security threats
Audit Metadata