autonomous-skill
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (MEDIUM): The skill uses bash templates that directly interpolate user-controlled variables (e.g.,
$USER_TASK,$USER_TASK_DESCRIPTION) into shell pipelines and CLI tool calls. - Evidence:
TASK_NAME=$(echo "$USER_TASK" | ...)in Step 1 andclaude -p "Task: $USER_TASK_DESCRIPTION ..."in Step 3. - Risk: If the agent executes these templates verbatim, an attacker can provide input containing shell metacharacters (e.g., backticks,
$()) or CLI flags (e.g.,--append-system-prompt) to hijack the execution environment or the spawned agent's behavior. - [PROMPT_INJECTION] (LOW): Indirect Prompt Injection Surface.
- Ingestion points:
task_list.mdandprogress.mdin the.autonomous/directory, which are generated from user-provided descriptions. - Boundary markers: Absent. The
executor-prompt.mdinstructions tell the agent to "trust the order" and "read the task list to see all work" without warning the agent that the content is untrusted. - Capability inventory: The skill grants broad
Bashaccess, including the ability to run theclaudeCLI, as well asWriteandEdittools. - Sanitization: None detected. User input is transformed into task names using basic
sedfilters, but the body of the task descriptions is placed directly into executable context in subsequent agent sessions. - [PROMPT_INJECTION] (MEDIUM): Potential for Prompt Leakage and Behavior Overriding. The skill uses the
--append-system-promptflag with user-influenced data, which is a high-risk pattern that can be used to override the core instructions of the secondary agent session.
Audit Metadata