speckit-checklist
Pass
Audited by Gen Agent Trust Hub on Mar 13, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill initiates a local subprocess call to
.specify/scripts/bash/check-prerequisites.shto extract project-specific metadata. While the script path is static, the skill processes user-provided arguments which could lead to command injection if not handled properly.\n- [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface by reading content fromspec.md,plan.md, andtasks.mdto inform checklist generation. 1. Ingestion points: Markdown files located in theFEATURE_DIR(Step 4). 2. Boundary markers: No explicit delimiters or instructions to ignore embedded commands are present in the retrieval step. 3. Capability inventory: The skill has the ability to execute shell scripts (Step 1) and write files to the local filesystem (Step 5). 4. Sanitization: The prompt includes explicit instructions for the agent to escape single and double quotes when handling shell arguments, providing a baseline level of protection against basic injection attempts.
Audit Metadata