markdown-validation
Fail
Audited by Gen Agent Trust Hub on Feb 18, 2026
Risk Level: HIGHCOMMAND_EXECUTION
Full Analysis
- COMMAND_EXECUTION (HIGH): The
PostToolUsehook example inSKILL.mdcontains a shell command injection vulnerability. The command expands the$CLAUDE_TOOL_INPUTvariable within double quotes in a shell pipeline (echo \"$CLAUDE_TOOL_INPUT\"), which allows for arbitrary code execution via subshell expansion syntax such as$(...)or backticks. An attacker could exploit this by providing tool input (like a filename) that includes a malicious payload. \n- PROMPT_INJECTION (SAFE): The skill is not vulnerable to indirect prompt injection. While thevalidate-markdown.pyscript ingests untrusted data from markdown files, its capability inventory is restricted to regex-based linting. It does not interpret or execute instructions found within the processed text, and thus the lack of sanitization or boundary markers does not present a runtime risk.
Recommendations
- AI detected serious security threats
Audit Metadata