template-initialization
Pass
Audited by Gen Agent Trust Hub on Mar 13, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes multiple local scripts and system commands to perform its tasks.
- Evidence: Executes
node scripts/init-template.mjs,scripts/discover-skills.mjs,pnpm run lint, andpnpm test. - [EXTERNAL_DOWNLOADS]: The skill downloads and installs third-party tools during the initialization process.
- Evidence: Invokes
uvxto installspecifyandspecify-extendfor GitHub Copilot integration. - [REMOTE_CODE_EXECUTION]: By using
uvxto fetch and run packages, the skill executes code downloaded from external package registries at runtime. - Evidence: Commands
uvx specify --ai copilotanduvx specify-extend --agent copilotdownload and execute external payloads. - [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface by processing untrusted user data in a powerful execution context.
- Ingestion points: The
descriptioninput provided by the user (SKILL.md). - Boundary markers: Absent; user input is passed to
scripts/discover-skills.mjswithout explicit delimiters or instructions to ignore embedded commands. - Capability inventory: The skill can execute arbitrary shell commands (
zx,node,uvx,pnpm) and modify local files (package.json,README.md). - Sanitization: Absent; no evidence of validation or filtering for the project description before it is used for skills discovery.
Audit Metadata