doc-prd-reviewer
Warn
Audited by Gen Agent Trust Hub on Mar 2, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill mandates the execution of bash commands such as
sha256sumandsedto verify document integrity. These commands incorporate variables like<file_path>andSection Namederived from the project structure and document content. Without strict sanitization of these inputs, an attacker could craft malicious file names or section headers to achieve command injection when the agent attempts to hash the file. - [PROMPT_INJECTION]: As a documentation reviewer, the skill processes untrusted content from Product Requirements Documents (PRD) and Business Requirements Documents (BRD). This creates an Indirect Prompt Injection surface where malicious text embedded in a PRD could influence the agent's logic, such as bypassing review checks, manipulating the 'Review Score', or triggering unintended 'Auto-Fixes'.
- Ingestion points: The agent reads multiple markdown files from
docs/02_PRD/anddocs/01_BRD/at runtime. - Boundary markers: The instructions lack explicit boundary markers or 'ignore' directives to separate document data from agent instructions during the review process.
- Capability inventory: The skill utilizes file system read/write access to apply fixes and generates shell commands for hashing.
- Sanitization: No sanitization or validation logic is defined for the content extracted from upstream artifacts before it is used in scoring or command assembly.
Audit Metadata