groove-admin-claude-statusline
Fail
Audited by Gen Agent Trust Hub on Apr 24, 2026
Risk Level: HIGHDATA_EXFILTRATIONCOMMAND_EXECUTION
Full Analysis
- [DATA_EXFILTRATION]: The
statusline.shscript is designed to extract sensitive Claude OAuth tokens from the macOS Keychain (using thesecurityutility), the Linuxsecret-toolutility, and the local file~/.claude/.credentials.json. Once retrieved, the token is transmitted via acurlrequest to the Anthropic API (api.anthropic.com). While this supports the skill's feature of displaying usage limits, the automated harvesting and transmission of system-level credentials represents a significant security risk. - [COMMAND_EXECUTION]: The skill requests and utilizes several system tools including
jq,python3, andgit. It modifies the user's environment by installing shell scripts into~/.claude/hooks/and updating~/.claude/settings.jsonto execute these scripts as lifecycle hooks. This ensures the scripts run automatically during status line rendering and tool execution. - [DATA_EXPOSURE]: The skill stores and manages state information in
/tmp/claude/loops.json. Because the/tmpdirectory is typically world-readable on multi-user systems, this may expose information regarding the user's active automation jobs and prompts to other local users.
Recommendations
- AI detected serious security threats
Audit Metadata