bmad
Warn
Audited by Gen Agent Trust Hub on Feb 18, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- EXTERNAL_DOWNLOADS (MEDIUM): The skill utilizes
npx bmad-method installto provision its environment. This command fetches thebmad-methodpackage directly from the npm registry. - Evidence:
npx bmad-method installcommands inSKILL.md(Step 1 and Example 2). - REMOTE_CODE_EXECUTION (MEDIUM): Using
npxwith a package from an untrusted organization (bmad-code-org) allows for the execution of arbitrary scripts on the user's system during the installation process. - Evidence: The installation steps in
SKILL.mdrequire executing non-standard tooling vianpx. - COMMAND_EXECUTION (LOW): The skill requires a variety of powerful system tools including
Bash,Write, andEditto function. These capabilities are expected for a development framework but increase the impact if the installation package is malicious. - Evidence:
allowed-toolssection inSKILL.mdfrontmatter. - INDIRECT_PROMPT_INJECTION (LOW): The skill processes external project artifacts (PRDs, Tech Specs) to drive its multi-agent orchestration, creating a surface for potential instruction injection.
- Ingestion points:
SKILL.mddefines workflows like/prdand/tech-specthat process untrusted project data. - Boundary markers: Absent; no specific delimiters or instruction-ignore warnings are defined for the processed data.
- Capability inventory:
Bash,Write,Edit, andnpxare available within the skill context. - Sanitization: Absent; there is no mention of input validation or sanitization for project files before they are processed by agents.
Audit Metadata