user-stories-to-api-spec
Warn
Audited by Gen Agent Trust Hub on Mar 30, 2026
Risk Level: MEDIUMDATA_EXFILTRATIONPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [DATA_EXFILTRATION]: The skill
user-stories-to-api-specperforms automated discovery by searching for sensitive authentication patterns within the source code. - Evidence:
grep -rn "Bearer\|AddJwtBearer\|Authorization" --include="*.cs" . | head -5inSKILL.md. - This behavior can inadvertently expose real hardcoded credentials, API keys, or JWT tokens stored in project files by displaying them in the agent's context during the convention detection phase.
- [PROMPT_INJECTION]: The skill pipeline is susceptible to indirect prompt injection because it processes untrusted requirements files through multiple stages without validation.
- Ingestion points:
SKILL.mdreadsrequirements.md;SKILL1.mdreads the resulting API spec;SKILL2.mdreads the technical plan to create GitLab issues. - Capability inventory: The skills can write files (
create_file) and interact with external systems via GitLab tools (mcp__gitlab__create_issue). - Sanitization: There are no boundary markers or instructions to sanitize or ignore embedded commands in the requirements data, allowing an attacker to potentially influence the generated tasks and issue tracking.
- Impact: Malicious requirements could lead to the creation of misleading GitLab issues, incorrect task assignments, or the injection of malicious content into project documentation.
- [COMMAND_EXECUTION]: The skills rely heavily on shell-based discovery tools for environment analysis.
- Evidence: Extensive use of
find,grep, andcatviabash_toolacrossSKILL.mdandSKILL1.mdto map the project architecture. - While intended for legitimate automation, the lack of strict input sanitization for paths (like the requirements file path) could be exploited if the agent fails to properly scope these commands.
Audit Metadata