architect-refine-critique
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFEPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- PROMPT_INJECTION (LOW): The skill is vulnerable to indirect prompt injection because it processes untrusted external data (codebases or PRDs) via the
targetparameter.\n - Ingestion points: File
agents/architect.md(viatargetparameter) andcommands/arc-review.md(which reads the generated markdown files).\n - Boundary markers: Absent. External content is interpolated directly into the agent context without delimiters or instructions to ignore embedded commands.\n
- Capability inventory: The agents have
Read,Glob,Grep, andWritetool permissions, which could be abused if an injected prompt successfully overrides the architectural task.\n - Sanitization: No sanitization of the input
targetis performed before it is processed by the Architect subagent.\n- EXTERNAL_DOWNLOADS (LOW): The skill references external dependencies that are not from trusted organizations.\n - Evidence: The agents
architect.md,refiner.md, andcritique.mdall referencedevelopment-skills:separation-of-concernsanddevelopment-skills:tactical-ddd. While these appear to be internal architectural skills, they do not originate from a verified trusted repository according to the security policy.
Audit Metadata