wf6-verify
Pass
Audited by Gen Agent Trust Hub on Feb 28, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes shell commands extracted from the
.wf/config.jsonfile under specific keys such asverify.test,verify.build, andverify.lint. If these files are manipulated, it allows for arbitrary command execution. - [COMMAND_EXECUTION]: The skill includes fallback logic that automatically executes CLI tools like
npm,pytest,go, andcargobased on the detection of project files (e.g.,package.json,pyproject.toml,go.mod). - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection as it processes content from untrusted project files to determine success criteria.
- Ingestion points: The skill reads content from
01_KICKOFF.md,.wf/config.json, andstate.json. - Boundary markers: There are no explicit markers or instructions to isolate or ignore instructions that may be embedded in these ingested files.
- Capability inventory: The skill has the capability to execute shell commands and write to the
state.jsonfile. - Sanitization: The skill does not appear to sanitize or validate file content before using it in logic or as command arguments.
Audit Metadata