hook-development
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- Indirect Prompt Injection (LOW): The skill promotes 'prompt-based' hooks that interpolate untrusted data (tool inputs like shell commands or file contents) directly into instructions for an LLM to evaluate safety. This creates an attack surface where malicious data could override the hook's logic.
- Ingestion points: Use of
$TOOL_INPUTvariables in hook prompts defined inhooks/hooks.jsonand documented inreferences/migration.mdandreferences/patterns.md. - Boundary markers: None are present in the provided documentation examples; untrusted variables are placed directly in the prompt string.
- Capability inventory: Hooks have the authority to
approve,deny, oraskregarding the execution of tools likeBashorWrite(file system operations). - Sanitization: No explicit sanitization or escaping of the tool input is shown in the provided patterns.
- Dynamic Execution (LOW): The utility script
scripts/test-hook.shis designed to execute local hook scripts for testing purposes. It wraps execution in atimeoutcommand but otherwise executes the provided file path directly, which is consistent with its primary purpose as a developer tool.
Audit Metadata