features-documentation
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [EXTERNAL_DOWNLOADS] (MEDIUM): The validation step uses
npx markdownlintandnpx markdown-link-check. These commands download and execute packages from the public npm registry at runtime. Without specific version pinning or integrity hashes, this represents an unverifiable dependency risk where the external package could be compromised or changed. - [COMMAND_EXECUTION] (LOW): The skill utilizes several Bash scripts to automate documentation checks. While the logic is functional, it involves executing shell commands like
grep,sed, andechoon strings extracted directly from source code files (.ts,.tsx). This creates a potential command injection surface if the source code contains maliciously crafted feature strings. - [PROMPT_INJECTION] (LOW): Indirect prompt injection surface exists (Category 8).
- Ingestion points: The skill reads feature strings from project source files (
*.ts,*.tsx) and documentation files (docs/features.md, etc.). - Boundary markers: No boundary markers or 'ignore' instructions are used when interpolating extracted content into the verification logic.
- Capability inventory: The skill has access to
Bash,Edit, andWritetools, as well as GitHub MCP tools. - Sanitization: There is no sanitization or validation of the strings extracted from the code before they are processed by the shell script or presented to the model.
Audit Metadata