doc-spec-validator
Pass
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses Python scripts located in the
ai_dev_ssd_flow/09_SPEC/scripts/directory to validate specification documents. These scripts are invoked via standard command-line instructions. - [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface as it is designed to process and validate external YAML specification documents.
- Ingestion points: YAML files located at
docs/09_SPEC/SPEC-NN_{slug}/SPEC-NN_{slug}.yaml. - Boundary markers: The skill does not define specific delimiters to isolate the content of the YAML files from the agent's internal instructions.
- Capability inventory: The skill has the capability to execute Python scripts via the system shell.
- Sanitization: The primary function of the skill is to perform schema validation and structure checks, which serves as a sanitization mechanism for the ingested data.
Audit Metadata