pre-flight-check
Pass
Audited by Gen Agent Trust Hub on Mar 4, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill exhibits a surface for indirect prompt injection by processing data from the local file system and issue tracking tools that may contain untrusted content.
- Ingestion points: The agent is instructed to read contents from
.worklog/,.claude/patterns/, and.claude/schemas/elements.json, as well as processing issue titles and descriptions via thebdtool. - Boundary markers: No explicit delimiters or instructions are provided to the agent to treat this data as untrusted or to ignore potential instructions embedded within them.
- Capability inventory: The skill utilizes
Read,Glob,Grep, andBashtools, which allow for reading file contents and executing shell commands. - Sanitization: There is no evidence of sanitization or validation of the content ingested from these sources before it is processed.
- [COMMAND_EXECUTION]: The skill uses the
Bashtool to execute local commands for project management, git workflow, and code validation. - Evidence: It executes
gitfor branch management and commits,npmfor running tests and linters (such aseslint,stylelint, andpa11y), and a custombdtool for issue tracking. While these are typical development operations, they represent a capability that could be targeted if the inputs to these commands are derived from malicious external sources.
Audit Metadata