ops-dash
Warn
Audited by Gen Agent Trust Hub on Apr 29, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes dynamic context injection via the
!syntax inSKILL.mdto execute the${CLAUDE_PLUGIN_ROOT}/bin/ops-dashshell script automatically when the skill is loaded. - [COMMAND_EXECUTION]: The skill bypasses the
disallowedToolsrestriction on theWritetool by usingBashto modify configuration files (preferences.json,registry.json) using output redirection and themvcommand. - [DATA_EXFILTRATION]: The skill contains logic to export system configuration to the local file system (
~/.claude-ops-setup.md), copy system metadata to the clipboard, and open external URLs to share data on X (Twitter). - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection. Ingestion points:
preferences.jsonanddaemon-health.json. Boundary markers: None. Capability inventory:Bashexecution andAgentteam management. Sanitization: No validation or escaping of the ingested JSON data is performed.
Audit Metadata