context-optimization
Fail
Audited by Gen Agent Trust Hub on May 9, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The
PostToolUsehook inSKILL.mduses an unsafe shell command pattern that interpolates the$CLAUDE_TOOL_INPUTvariable directly into anechostatement. If the platform performs string replacement or if the shell evaluates the variable content, an attacker could trigger arbitrary command execution by providing tool inputs containing shell metacharacters such as backticks or command substitution sequences.\n- [EXTERNAL_DOWNLOADS]: Themodules/mecw-principles.mdmodule references a non-standard Python package namedleyline. This package is not an established industry tool and its source is not specified, posing a supply chain risk if the agent attempts to install or run code from it.\n- [REMOTE_CODE_EXECUTION]: Multiple modules, includingmodules/memory-tiers.mdandmodules/session-routing.md, reference and attempt to import logic from a local file atscripts/agent_memory.py. Since this script is not included in the provided file set, the skill's actual operational behavior is unverifiable and could lead to the execution of unvetted local code.
Recommendations
- AI detected serious security threats
Audit Metadata