grace-ask
Pass
Audited by Gen Agent Trust Hub on Apr 9, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses the
graceCLI tool (e.g.,grace module find,grace module show) to explore project architecture and retrieve module details. These commands are executed locally within the project environment. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection through its file ingestion process.
- Ingestion points: It reads
AGENTS.mdand multiple XML files within thedocs/directory (SKILL.md). - Boundary markers: There are no explicit delimiters or instructions to ignore embedded prompts when processing these project artifacts.
- Capability inventory: The skill is capable of reading project files and executing local CLI commands to gather information.
- Sanitization: No sanitization or escaping of ingested content is mentioned in the instructions.
Audit Metadata