gsd-orchestrator
Pass
Audited by Gen Agent Trust Hub on Apr 11, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes a local Node.js script located at
~/.claude/get-shit-done/bin/gsd-tools.cjsto initialize and track workflow progress. This is the core functionality of the orchestrator. - [PROMPT_INJECTION]: Surface for indirect prompt injection via untrusted user data. 1. Ingestion points: User-provided task descriptions, PRD documents (via --auto @doc.md), and architecture opinions processed in
SKILL.md. 2. Boundary markers: Absent; the skill does not explicitly instruct the agent to use delimiters or ignore instructions within the ingested data. 3. Capability inventory: The skill utilizesnodefor command execution and performs extensive file system operations (read/write) for project management. 4. Sanitization: No explicit sanitization or validation of the user-provided content is performed before it is passed to subagents or tool arguments.
Audit Metadata