project-initializer
Pass
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses the
Bashtool to executels -laandmkdir -pfor directory management and verification. These commands are used to create the scaffolding for the project structure.- [DATA_EXPOSURE_AND_EXFILTRATION]: Accesses a local project registry file at~/.claude/drupal-dev-framework/active_projects.jsonto store and retrieve project metadata and base paths. This is used for local state persistence within the agent's workspace.- [PROMPT_INJECTION]: The skill implements a security control by validating the user-providedproject_nameagainst a strict regular expression (^[a-z][a-z0-9_]*$) before it is used in any shell commands, effectively preventing command injection attacks.- [INDIRECT_PROMPT_INJECTION]: The skill exhibits an attack surface for indirect prompt injection as it processes data from a local JSON registry file. - Ingestion points: Data is read from
~/.claude/drupal-dev-framework/active_projects.jsonduring the initialization and registration steps. - Boundary markers: The skill relies on a structured JSON schema to parse and validate the registry content.
- Capability inventory: The skill possesses the ability to execute shell commands (
Bash), write files (Writetool), and read files (Readtool). - Sanitization: Input validation is present for the project name, though the storage path (
projectsBase) relies on user input or the existing registry value.
Audit Metadata