claude-agent-sdk
Warn
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: In
templates/custom-mcp-server.ts, the 'calculate' tool implementation uses the JavaScripteval()function to evaluate expressions provided inargs.expression. If the input is not strictly sanitized, this allows for the execution of arbitrary JavaScript code within the agent's process. - [COMMAND_EXECUTION]: The skill explicitly documents and provides templates (e.g.,
templates/permission-control.tsandreferences/permissions-guide.md) for thebypassPermissionsmode. This setting disables all safety checks, allowing an agent to execute Bash commands and modify the filesystem without human oversight or confirmation. - [PROMPT_INJECTION]: The skill presents a high vulnerability to indirect prompt injection in
templates/multi-agent-workflow.ts. TherunDevOpsAgentfunction accepts ataskstring from an untrusted external source and uses it directly as the primary prompt for a multi-agent system equipped with powerful tools likeBash,Write, andEdit, without implementing robust boundary markers or input sanitization.
Audit Metadata