do
Warn
Audited by Gen Agent Trust Hub on Feb 27, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
hooks/verify-loop.pyscript executes commands retrieved from theverify_commandsfield oftask.jsonusingsubprocess.run(shell=True). This creates a path for arbitrary command execution if the task configuration file is modified. - [COMMAND_EXECUTION]: The
scripts/task.pyscript executesgitcommands viasubprocess.runto manage git worktrees and branch creation during the development phase. - [EXTERNAL_DOWNLOADS]: The agent definitions for
code-architect,code-explorer, andcode-reviewerare granted access toWebFetchandWebSearchtools, enabling them to interact with external web resources. - [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface as it processes untrusted codebase data and user requirements to formulate agent prompts.
- Ingestion points: The
scripts/get-context.pyscript andcode-exploreragent read contents from the local codebase;scripts/setup-do.pycaptures the initial user task description. - Boundary markers: No explicit delimiters or instruction-ignore warnings are implemented when interpolating codebase data into agent prompts.
- Capability inventory: The skill utilizes
subprocess.runand provides agents withBash,KillShell, andBashOutputcapabilities. - Sanitization: The provided scripts do not perform sanitization or escaping of the ingested codebase content before prompt interpolation.
- [SAFE]: The
install.pyscript registers a persistentStophook in the user's~/.claude/settings.json. This is used legitimately to maintain the state of the 5-phase workflow across agent sessions.
Audit Metadata