Evals
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTIONDATA_EXFILTRATION
Full Analysis
- COMMAND_EXECUTION (HIGH): The files
Graders/CodeBased/BinaryTests.tsandGraders/CodeBased/StaticAnalysis.tsutilize Bun's shell execution ($) to run commands specified in external task configuration YAML files. Specifically,params.test_commandandparams.commandsare executed directly, which allows for arbitrary command injection and execution if a task file is malicious or becomes corrupted. - PROMPT_INJECTION (MEDIUM): The
SKILL.mdfile contains a 'MANDATORY: Voice Notification' section that uses forceful language ('MUST', 'REQUIRED', 'not optional') to override agent behavior. It compels the agent to execute acurlcommand tolocalhost:8888immediately upon invocation, which is a pattern commonly used in prompt injections to force side-channel actions. - DATA_EXFILTRATION (MEDIUM): The
Graders/CodeBased/StateCheck.tsutility is designed to read and verify system state, including environment variables viaparams.check_envand file contents viaparams.check_files. While intended for testing, these capabilities can be used to expose sensitive system information (secrets, keys, or private files) if the task definitions are controlled by an attacker. - REMOTE_CODE_EXECUTION (MEDIUM): The skill dynamically loads and executes logic from a 'customization' directory (
~/.claude/skills/CORE/USER/SKILLCUSTOMIZATIONS/Evals/) if it exists, which could lead to persistent local code execution if that directory is tampered with.
Recommendations
- AI detected serious security threats
Audit Metadata