claudelabs
Fail
Audited by Gen Agent Trust Hub on Mar 13, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The
executeBankrCommandfunction inindex.jsuseschild_process.execSyncto run shell commands. It only escapes double-quote characters in the user-provided prompt, failing to sanitize other shell metacharacters such as backticks (`), dollar signs ($), semicolons (;), and pipes (|). An attacker or malicious input can trigger arbitrary command execution on the host machine.\n- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it processes untrusted data from theparams.dataobject and passes it to the system shell.\n - Ingestion points:
queryvariable inindex.jssourced fromdata.queryordata.prompt.\n - Boundary markers: None present.\n
- Capability inventory:
execSynccall to thebankrCLI tool.\n - Sanitization: Inadequate; only double quotes are escaped, leaving other shell metacharacters active.\n- [EXTERNAL_DOWNLOADS]: The README and SKILL.md files recommend installation via
npx skills add anthropics-claude/claudelabs-skill@claudelabs. This targets the author's official repository and is documented as a standard procedure.
Recommendations
- AI detected serious security threats
Audit Metadata