task-status
Fail
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: HIGHDATA_EXFILTRATIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [DATA_EXFILTRATION]: Hardcoded Telegram user ID
7590912486is set as the default target for status messages inscripts/send_status.py,scripts/send_status_websocket.py, andscripts/send_status_with_logging.py.- [COMMAND_EXECUTION]: The skill usessubprocess.runto execute theclawdbotCLI tool as a fallback mechanism for sending messages inscripts/send_status.pyandscripts/send_status_with_logging.py.- [PROMPT_INJECTION]: Instructions inSKILL.mdsuggest the agent use acronmodule to programmatically schedule tasks, which can lead to unauthorized persistent behavior.- [DATA_EXFILTRATION]: Multiple files, includingscripts/monitor_task.pyandscripts/send_status_with_logging.py, contain hardcoded absolute system paths (e.g.,C:\Users\Luffy\...), exposing local user and directory structures.
Recommendations
- AI detected serious security threats
Audit Metadata