statusline-setup
Warn
Audited by Gen Agent Trust Hub on Apr 1, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill encourages the execution of
bunx ccstatusline@latestandnpx ccstatusline@latest, which downloads and runs a third-party package from an unverified repository (github.com/sirmalloc/ccstatusline). - [COMMAND_EXECUTION]: Documentation for the recommended
ccstatuslineutility describes aCustomCommandwidget that allows for the execution of arbitrary shell commands, creating a risk if malicious configurations are introduced. - [COMMAND_EXECUTION]: The skill includes shell scripts (
scripts/install-statusline.shandscripts/restore-statusline.sh) that perform file system operations, such as modifying permissions withchmodand moving files within the~/.claude/configuration directory. - [COMMAND_EXECUTION]: By updating
~/.claude/settings.jsonto point to a script or theccstatuslinetool, the skill establishes a persistence mechanism that executes code every time the application's interface status updates. - [DATA_EXFILTRATION]: Scripts and documentation demonstrate how to access the session transcript file via the
transcript_pathvariable. This allows status line scripts to read the full conversation history, which could be misused to harvest sensitive information from session logs.
Audit Metadata