autonomous-skill
Fail
Audited by Gen Agent Trust Hub on Mar 11, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes the
claudeCLI using the--permission-mode bypassPermissionsflag in thescripts/run-session.shscript. This explicitly disables the security model that requires user confirmation for sensitive tool usage, allowing the sub-agent to perform arbitrary actions on the host system.\n- [REMOTE_CODE_EXECUTION]: An autonomous execution loop is implemented inscripts/run-session.shandSKILL.mdthat automatically starts new agent sessions. Combined with the permission bypass, this creates a persistent, unmonitored environment for executing code and commands on the user's machine.\n- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because theExecutor Agentcontext is built from the contents oftask_list.mdandprogress.md(ingestion points inscripts/run-session.sh). There are no boundary markers or sanitization processes (sanitization: absent) to prevent malicious instructions within these files from being obeyed. Since the agent has full system capabilities (capability inventory: bash, file write, etc.) via the permission bypass, this could lead to full system compromise.
Recommendations
- AI detected serious security threats
Audit Metadata