android-development
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- EXTERNAL_DOWNLOADS (LOW): The skill suggests cloning a repository from an untrusted GitHub account (dpconde/claude-android-skill) during installation.
- COMMAND_EXECUTION (LOW): The README and SKILL.md files reference a local Python script (scripts/generate_feature.py) for generating Android feature modules. While this is a common developer tool function, the script itself was not provided for a security audit.
- INDIRECT_PROMPT_INJECTION (LOW): The skill is designed to ingest user instructions to generate code, creating an attack surface for indirect prompt injection. 1. Ingestion points: User-provided feature names and specifications in Claude Code. 2. Boundary markers: No delimiters or warnings are specified in the provided documentation. 3. Capability inventory: The skill uses a Python script to perform file system operations and code generation. 4. Sanitization: No sanitization methods are documented for handling user-provided strings.
Audit Metadata