speckit-incorporate
Pass
Audited by Gen Agent Trust Hub on Mar 13, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Uses shell commands to interact with the git repository and modify files.
- Employs
git rev-parseand sources a local script.specify/scripts/bash/common.shfor environment context. - Modifies files by appending content via
catand heredocs. - [PROMPT_INJECTION]: Vulnerable to indirect prompt injection through external document processing.
- Ingestion points: Content is read from a user-supplied
<document-path>(fileSKILL.md). - Boundary markers: Utilizes quoted heredocs (
'EOF') to safely append content to files, but lacks explicit constraints to prevent the agent from following instructions embedded in the source documents. - Capability inventory: Able to modify project files and invoke other high-level workflow commands like
/speckit.planand/speckit.tasks(fileSKILL.md). - Sanitization: Content from external documents is processed and incorporated without validation or filtering for malicious instructions.
Audit Metadata