hookshot
Warn
Audited by Gen Agent Trust Hub on Apr 26, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill generates shell scripts (
check-docs.sh,check-skill-drift.sh,check-md-lint.sh) and wires them into the agent environment via.claude/settings.json. The generatedcheck-skill-drift.shcontains a command injection flaw where it interpolates the environment-providedFILE_PATHvariable into a Python string literal without escaping, potentially allowing arbitrary code execution via crafted filenames. - [PROMPT_INJECTION]: Indirect prompt injection surface detected. 1. Ingestion points:
docs/code-structure.md,docs/code-guidelines.md, andARCHITECTURE.md. 2. Boundary markers: Absent; reminders are printed directly to stderr with generic emojis. 3. Capability inventory:Read,Write, andBashtools used for hook implementation. 4. Sanitization: Absent; documentation content is directly promoted to the agent's context as enforcement reminders without validation or escaping. - [EXTERNAL_DOWNLOADS]: The skill downloads
markdownlint-cli2vianpxand installs itself from the vendor's repository. These operations are consistent with the skill's stated purpose.
Audit Metadata