lf-specs
Pass
Audited by Gen Agent Trust Hub on Mar 24, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: Indirect Prompt Injection surface via external design data. The skill fetches metadata, component names, and design annotations from user-provided Figma URLs using the
mcp__plugin_figma_figma__get_design_contextandmcp__plugin_figma_figma__get_metadatatools. - Ingestion points: Metadata and design context retrieved from Figma files are stored in internal variables and then written to
briefing-tech.vN.mdandspecs.md(Step 4 and 5). - Boundary markers: The instructions do not define delimiters or specific 'ignore instructions' warnings when incorporating the externally fetched Figma content into the resulting technical documents.
- Capability inventory: The skill possesses extensive file-system capabilities including
Glob,Read, and the ability to write/overwrite files in theai/specs/directory. - Sanitization: There is no evidence of sanitization or filtering of the content retrieved from Figma before it is processed by the agent.
- [COMMAND_EXECUTION]: Path Traversal and Glob Injection risk. The skill directly interpolates the
$ARGUMENTSvariable into a file search pattern:ai/specs/*$ARGUMENTS*/briefings/briefing-tech.v*.md(Step 1). If a user provides malicious input containing path traversal sequences (e.g.,../../), they could potentially influence the agent to list or read files outside the intended feature folder scope.
Audit Metadata