project-status
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- PROMPT_INJECTION (HIGH): The skill is designed to perform "intelligent context analysis" by reading various files across a repository. This creates a significant surface for indirect prompt injection where an attacker could place malicious instructions in project documentation.
- Ingestion points: The skill reads
README.md,SPEC-*.md,PLAN.md, andWORKLOGfiles across theideas/directory. - Boundary markers: There are no delimiters or instructions to ignore embedded commands within the processed files.
- Capability inventory: The skill is granted the
Tasktool, which typically allows shell command execution, alongsideRead,Glob, andGrep. - Sanitization: No sanitization or validation of the file content is performed before analysis.
- COMMAND_EXECUTION (LOW): The skill uses shell commands like
ls,git branch, andgit logto extract status information. While these are necessary for the skill's stated purpose, they represent the execution vector that could be exploited if an indirect prompt injection attack is successful.
Recommendations
- AI detected serious security threats
Audit Metadata