session-handoff
Pass
Audited by Gen Agent Trust Hub on Apr 30, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses shell utilities including
grep,cut,tail, andheadto process local files. It also relies on theentireCLI (entire status,entire explain) for session management and checkpoint analysis. - [DATA_EXFILTRATION]: The agent reads session transcripts and metadata files located in
.git/entire-sessions/and tool-specific directories. These files contain the history of previous interactions, which may include code, configurations, or other sensitive user data. - [PROMPT_INJECTION]: The skill ingests historical transcript data to generate compaction summaries. This creates a surface for indirect prompt injection where instructions present in past conversation logs could influence the agent's behavior during the handoff process.
- Ingestion points: Local transcript files (JSONL) identified via session metadata stored in
.git/entire-sessions/. - Boundary markers: No explicit delimiters are specified to isolate the untrusted transcript data during the extraction phase.
- Capability inventory: Execution of shell commands, filesystem access via agent tools, and interaction with the
entireCLI. - Sanitization: Transcript content is processed and summarized without explicit sanitization or filtering of potential instruction-like strings.
Audit Metadata