reviewing-security
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION] (HIGH): The skill explicitly instructs the agent to execute a bash script located at a hidden path:
~/.claude/plugins/marketplaces/claude-configs/review/scripts/review-security.sh. This represents arbitrary command execution. - [REMOTE_CODE_EXECUTION] (HIGH): Execution of scripts from the
~/.claude/plugins/marketplaces/directory implies reliance on external content that may have been downloaded at runtime, which is a common RCE vector. - [EXTERNAL_DOWNLOADS] (LOW): The skill utilizes
npm auditandyarn audit, which connect to external package registries. Per [TRUST-SCOPE-RULE], these are considered trusted sources for audits, but remain a network-dependent operation. - [DATA_EXPOSURE] (HIGH): Multiple
greppatterns target sensitive information includingAPI_KEY,SECRET,PASSWORD, andTOKENwithin.envfiles. Accessing these files exposes credentials to the agent session. - [INDIRECT_PROMPT_INJECTION] (HIGH): This is a code review skill that ingests untrusted source code and metadata.
- Ingestion points: Reads all
.ts,.js,.tsx,.jsx, and.envfiles within a project viaGrepandReadtools. - Boundary markers: Absent. There are no instructions to the agent to treat the content of files as data rather than instructions.
- Capability inventory: Possesses
BashandReadpermissions; executes a specialized review script. - Sanitization: Absent. Data from external files is processed directly by grep patterns and the review script without validation.
Recommendations
- AI detected serious security threats
Audit Metadata