build
Pass
Audited by Gen Agent Trust Hub on Mar 13, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill executes dynamically detected test runners and setup commands (such as
npm testorpytest) within a Bash subagent during the verification stage (Stage 7). These commands are derived from local project configuration files likepackage.jsonorpyproject.tomlvia the project detection logic inreferences/project-detection.md. - [EXTERNAL_DOWNLOADS]: During its pre-flight dependency check, the skill identifies if the
shipskill is missing and recommends installation from the author's repository (slamb2k/mad-skills) using thenpx skills addcommand. This is a vendor-owned resource intended to extend the pipeline's capabilities. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it reads untrusted data from the local codebase (e.g., source code, documentation) and user-provided plans, which are then substituted into prompts for subagents. A subagent receiving a plan or code containing malicious instructions could potentially be influenced to perform unauthorized actions using its available tools.
- Ingestion points: User-provided plans passed as arguments to the
buildcommand; codebase exploration results from Stage 1 (found inreferences/stage-prompts.md). - Boundary markers: Prompts in
references/stage-prompts.mduse structured headers like## Planand## Exploration Findingsto delimit external data. - Capability inventory: Subagents used by the skill possess
Write,Edit, andBashcapabilities across various stages (Implementation, Fix, Verify). - Sanitization: Content is substituted directly into templates; no explicit sanitization or instructions to ignore embedded commands within the ingested codebase data are provided.
Audit Metadata