clack
Pass
Audited by Gen Agent Trust Hub on Feb 20, 2026
Risk Level: SAFE
Full Analysis
- [EXTERNAL_DOWNLOADS] (LOW): The
scripts/sync_references.shscript contains agit clonecommand targeting the official repository for the Clack library (https://github.com/bombshell-dev/clack.git). This is a maintenance script and does not pose a runtime risk to the user. - [DATA_EXPOSURE] (LOW): The
references/source/prompts/path.tsfile implements a filesystem navigation component. This allows the CLI to read directory contents and file names for autocomplete functionality. While this accesses the local filesystem, it is limited to metadata (filenames) and is the intended primary purpose of the component. - [DYNAMIC_EXECUTION] (SAFE): The examples use
jitifor just-in-time execution of TypeScript files. This is standard developer tooling for the Node.js ecosystem and is used here in a controlled context for demonstration purposes. - [INDIRECT_PROMPT_INJECTION] (LOW): The skill provides tools for ingesting user input via terminal prompts. While this is a potential attack surface if the agent were to blindly execute output from these prompts, the library includes built-in validation mechanisms (as seen in
text.tsand examples) to sanitize and constrain input.
Audit Metadata