project-config
Pass
Audited by Gen Agent Trust Hub on Mar 7, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes multiple shell commands including
find,grep, andlsto traverse the workspace and extract information from project files (e.g., scanning.csprojandpackage.json). - [COMMAND_EXECUTION]: It uses
node -eto run inline JavaScript that loads and executes local project files such as./.claude/hooks/lib/project-config-schema.cjsand./.claude/hooks/tests/test-all-hooks.cjs. - [PROMPT_INJECTION]: The skill has an indirect prompt injection surface (Category 8) because it ingests data from arbitrary project files to populate the configuration.
- Ingestion points: Reads
docs/project-config.json,package.json,.csprojfiles, and source code contents across thesrc/directory. - Boundary markers: No specific delimiters or "ignore embedded instructions" markers are applied to the data being scanned and processed.
- Capability inventory: The skill can execute shell commands, run local Node scripts, and write to the file system (updating
project-config.jsonand creatingCLAUDE.md). - Sanitization: It uses a local schema validator (
project-config-schema.cjs) to ensure the resulting JSON matches the expected structure, which provides a layer of structural validation but does not prevent malicious content in string values.
Audit Metadata