api-design
Warn
Audited by Gen Agent Trust Hub on Apr 10, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The file
scripts/create-openapi-spec.mdutilizes the dynamic context injection syntax (!command) to execute shell operations likegrepanddateautomatically when the script is processed by the agent. This includes searching for route definitions and environment variables. - [CREDENTIALS_UNSAFE]: The script
scripts/create-openapi-spec.mdis designed to extract values from.env*files usinggrep. While intended for discovering API base URLs, automated scanning of environment files is a sensitive operation that can inadvertently expose secrets or internal configuration details if they are present in the searched files. - [PROMPT_INJECTION]:
- Ingestion points: The skill instructions and
path_patternsconfigure the agent to read and analyze content from**/routes/**,**/api/**, and**/endpoints/**. - Boundary markers: The skill lacks explicit delimiters or instructions to the agent to disregard potentially malicious commands embedded in comments or strings within the ingested source code.
- Capability inventory: The agent has access to powerful tools including
WebFetch,WebSearch, and shellGrepthrough theallowed-toolsconfiguration. - Sanitization: No sanitization or validation logic is defined to prevent instructions found in untrusted project files from influencing the agent's behavior.
Audit Metadata