cco
Pass
Audited by Gen Agent Trust Hub on Mar 24, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes a local Node.js script located at
${CLAUDE_PLUGIN_ROOT}/src/tracker.jsto generate the heatmap data from the current session activity. - [DATA_EXPOSURE]: The skill accesses session metadata (file interactions and token usage statistics) to provide feedback on context waste, which is consistent with its stated purpose.
- [PROMPT_INJECTION]: An indirect prompt injection surface exists because the skill processes output from a script that analyzes session history.
- Ingestion points: Output from the
nodecommand inSKILL.md. - Boundary markers: None present; the agent is instructed to present the heatmap output directly.
- Capability inventory: Restricted to
BashandReadtools via the YAML frontmatter. - Sanitization: No explicit sanitization of the tracker's output is mentioned before being processed by the agent.
Audit Metadata