doc-spec-validator

Pass

Audited by Gen Agent Trust Hub on Mar 1, 2026

Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill uses Python scripts located in the ai_dev_ssd_flow/09_SPEC/scripts/ directory to validate specification documents. These scripts are invoked via standard command-line instructions.
  • [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface as it is designed to process and validate external YAML specification documents.
  • Ingestion points: YAML files located at docs/09_SPEC/SPEC-NN_{slug}/SPEC-NN_{slug}.yaml.
  • Boundary markers: The skill does not define specific delimiters to isolate the content of the YAML files from the agent's internal instructions.
  • Capability inventory: The skill has the capability to execute Python scripts via the system shell.
  • Sanitization: The primary function of the skill is to perform schema validation and structure checks, which serves as a sanitization mechanism for the ingested data.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 1, 2026, 08:49 AM