hook-factory
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- COMMAND_EXECUTION (SAFE): The hooks execute various development tools (e.g.,
black,pytest,git) via shell commands. All environment-provided variables like$CLAUDE_TOOL_FILE_PATHare properly quoted to prevent command injection vulnerabilities. - DATA_EXFILTRATION (LOW): The
prompt-preprocessorhook logs user prompts to a local file at.claude/prompt_log.txt. While this is a form of local data exposure, it is a documented feature for session tracking and user analysis. - PROMPT_INJECTION (LOW): The
prompt-preprocessorhook includes functionality to inject project-specific context from.claude/context.txtinto the agent's input stream. This is an intended feature and does not attempt to bypass agent safety filters. - DEFENSIVE_CONTROLS (SAFE): The skill includes several security-focused hooks. The
security-scanhook detects hardcoded secrets (API keys, tokens) before git pushes, and thepre-tool-validationhook attempts to protect sensitive configuration files from being modified by the agent. Note: Thepre-tool-validationhook is incorrectly configured forPostToolUsein its JSON file, which may prevent it from blocking writes before they occur.
Audit Metadata