continuous-learning-v2
Fail
Audited by Gen Agent Trust Hub on Mar 14, 2026
Risk Level: CRITICALCOMMAND_EXECUTIONDATA_EXFILTRATIONREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The shell script
hooks/observe.shcontains a critical Python code injection vulnerability. It interpolates the shell variable$INPUT_JSONdirectly into a Python script within a heredoc using triple quotes ('''$INPUT_JSON'''). An attacker can craft a tool input or output containing'''to escape the Python string literal and execute arbitrary commands on the user's system. This hook executes automatically on every tool call. - [DATA_EXFILTRATION]: This skill implements a persistent logger that captures the inputs and outputs of agent tools, including file content and bash command results. This data is stored in
~/.claude/homunculus/observations.jsonland is automatically sent to the LLM provider via the background 'observer' agent for analysis. This creates a high risk of exfiltrating credentials, private keys, or proprietary source code that may appear in the session history. - [REMOTE_CODE_EXECUTION]: The
scripts/instinct-cli.pyutility supports animportcommand that fetches behavioral 'instincts' from arbitrary remote URLs usingurllib.request.urlopen. This facilitates the ingestion of untrusted external instructions that modify the agent's behavior and could be used to deliver malicious payloads. - [COMMAND_EXECUTION]: The
agents/start-observer.shscript automates the background execution of theclaudeCLI, feeding it data harvested from the session observation log. This automated loop creates an execution path for data processed by the agent, which could be exploited through indirect prompt injection to perform unauthorized actions on the host system.
Recommendations
- AI detected serious security threats
Audit Metadata