plot-idea
Fail
Audited by Gen Agent Trust Hub on Mar 2, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill constructs shell commands by directly interpolating the
<title>variable extracted from$ARGUMENTS. While the<slug>is validated against a safe regex, the title (defined as everything after the first colon) is used directly inside double-quoted strings in commands likegit commit -m "plot: <title>"andgh pr create --title "Plan: <title>". An attacker could provide a title such asMy Title" ; malicious_command ; #to break out of the string and execute arbitrary shell commands. - [COMMAND_EXECUTION]: Configuration values read from the project's
CLAUDE.mdfile, such as<project board name>, are interpolated into shell commands (e.g.,gh pr edit <number> --add-project "<project board name>"). If a repository contains a maliciously craftedCLAUDE.md, it can trigger command execution when the skill is run. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection via the processing of untrusted data from the user and the repository environment.
- Ingestion points: The
$ARGUMENTSvariable provided by the user and theCLAUDE.mdconfiguration file found in the repository (SKILL.md steps 1 and 7). - Boundary markers: No boundary markers or delimiters are used to wrap the interpolated content, nor are there instructions to the agent to ignore embedded commands within these fields.
- Capability inventory: The skill possesses extensive capabilities including branching, committing, and pushing code (
git), as well as creating and editing pull requests (ghCLI), and writing to the local filesystem (mkdir,ln,cat). - Sanitization: Sanitization is only applied to the
slugfield (regex[a-z0-9-]+). No sanitization, escaping, or validation is performed on thetitlefield or the configuration values extracted fromCLAUDE.md.
Recommendations
- AI detected serious security threats
Audit Metadata