session-replay
Pass
Audited by Gen Agent Trust Hub on Apr 13, 2026
Risk Level: SAFEDATA_EXFILTRATIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [DATA_EXFILTRATION]: Accesses the
~/.claude/projects/directory to discover and read session JSONL files. These files contain sensitive information, including the history of user prompts and AI responses. - [COMMAND_EXECUTION]: Dynamically generates VHS configuration scripts (.tape files) based on the content of session logs and executes them using the
scry:vhs-recordingskill. This pattern of script generation from data represents a potential execution vector. - [PROMPT_INJECTION]: Vulnerable to indirect prompt injection through processed session data.
- Ingestion points: Reads local session history files via
scribe.session_parser(SKILL.md). - Boundary markers: No explicit boundary markers or instruction-ignoring delimiters are mentioned for the session content.
- Capability inventory: Includes the ability to write files (
Write), run shell commands (Bash), and call other skills (Skill). - Sanitization: The error handling section acknowledges potential 'string escaping bugs' when generating tapes, indicating that malicious content within session logs might not be safely neutralized.
- [EXTERNAL_DOWNLOADS]: Recommends installing the
vhsutility from Charmbracelet's official GitHub repository (github.com/charmbracelet/vhs) as a prerequisite for GIF rendering.
Audit Metadata