api-design
Fail
Audited by Gen Agent Trust Hub on Feb 27, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The file
scripts/create-openapi-spec.mdutilizes shell command execution (using!syntax) to perform filesystem operations. It runs commands such asgrep,wc, anddateto programmatically inspect the user's local directory and extract API metadata.\n- [DATA_EXFILTRATION]: The script inscripts/create-openapi-spec.mdspecifically targets sensitive file paths by executinggrep -r "API_URL|BASE_URL|VITE_API" .env*. While it filters for URL patterns, any programmatic access to environment files is a high-risk data exposure vector that brings sensitive configuration secrets into the AI agent's context.\n- [PROMPT_INJECTION]: Thescripts/create-openapi-spec.mdscript interpolates user-provided$ARGUMENTSdirectly into the task prompt and description. Without proper sanitization, this provides a surface for prompt injection that could be used to manipulate the agent's logic during the specification generation process.
Recommendations
- AI detected serious security threats
Audit Metadata