hook-creator
Warn
Audited by Gen Agent Trust Hub on Mar 5, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill facilitates the creation of shell-based hooks stored in configuration files like
~/.claude/settings.json. These hooks execute arbitrary system commands triggered by agent events. Evidence:SKILL.mddefines a configuration structure for shell commands, andreferences/examples.mdprovides scripts for logging and system notifications. - [COMMAND_EXECUTION]: The skill establishes persistence by guiding the modification of agent configuration files to run scripts automatically during future sessions or tool uses. Evidence:
SKILL.mdstep 5 and theSessionStartevent documentation inreferences/hook-events.md. - [EXTERNAL_DOWNLOADS]: Example configurations in
references/examples.mdusenpx prettier, which may fetch the Prettier utility from the NPM registry. - [PROMPT_INJECTION]: Risk of indirect command injection through unvalidated tool inputs. Ingestion points: Hooks process JSON from stdin containing fields like
tool_input.file_path, which can be influenced by external data. Boundary markers: No delimiters or safety instructions are present in the example configurations. Capability inventory: The skill enables arbitrary shell execution, file modification, and system notifications. Sanitization: Provided examples use basicjqand shell variables without robust escaping, potentially allowing malicious inputs (e.g., filenames with shell metacharacters) to execute unintended commands.
Audit Metadata