managing-todos
Fail
Audited by Gen Agent Trust Hub on Mar 25, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
todo.shscript is vulnerable to shell command injection through unquoted heredocs. In thecmd_createfunction, thecat <<EOFconstruct evaluates command substitutions (such as$(...)) or backticks contained within the$titleor$bodyvariables. This allows arbitrary code execution if the agent handles maliciously crafted input.- [COMMAND_EXECUTION]: A shell injection vulnerability exists in theload_configfunction. TheVALID_STATUSESvariable is populated fromCLAUDE.mdand used unquoted in aforloop (for s in $VALID_STATUSES; do). An attacker can execute commands by crafting a maliciousstatusesentry in the configuration file.- [COMMAND_EXECUTION]: The script usessedunsafely incmd_updateandcmd_archive. Variables are interpolated directly intosedcommand strings without sanitization, allowing an attacker to useseddelimiters and command separators to modify files unexpectedly.- [DATA_EXFILTRATION]: The command injection flaws enable data exfiltration. An attacker can use command substitution in todo fields to read sensitive files and save their contents into the todo markdown files created by the script.- [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface by processing untrusted data. - Ingestion points: Reads project configuration from
CLAUDE.mdand todo content from markdown files in thedocs/todosdirectory. - Boundary markers: None identified. The script reads file contents directly into shell variables.
- Capability inventory: Includes file system writes (
cat >), file modification (sed -i), and file movement (mv). - Sanitization: None. Configuration values and todo contents are used in shell operations without escaping or validation.
Recommendations
- AI detected serious security threats
Audit Metadata