ccboard

Fail

Audited by Gen Agent Trust Hub on Mar 1, 2026

Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
  • [REMOTE_CODE_EXECUTION]: The installation scripts fetch the Rust toolchain installer from https://sh.rustup.rs and pipe it to the shell. While an automated scanner flagged this URL, it is the well-known official installer for the Rust programming language.
  • [EXTERNAL_DOWNLOADS]: The skill installs the ccboard utility from the official Rust package registry via cargo install.
  • [DATA_EXFILTRATION]: The skill reads sensitive information including conversation history and configuration files from the ~/.claude/ directory to provide monitoring and analytics. This data is displayed in the dashboard and can be served locally via a web interface.
  • [COMMAND_EXECUTION]: The skill invokes the ccboard binary to launch the TUI and web dashboard and uses system commands to verify MCP server status.
  • [PROMPT_INJECTION]: The skill processes untrusted content from Claude Code session logs, creating an indirect injection surface. 1. Ingestion points: session files in ~/.claude/projects/. 2. Boundary markers: none identified in skill scripts. 3. Capability inventory: local binary execution and file access. 4. Sanitization: logic resides within the ccboard binary.
Recommendations
  • HIGH: Downloads and executes remote code from: https://sh.rustup.rs - DO NOT USE without thorough review
  • Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata
Risk Level
HIGH
Analyzed
Mar 1, 2026, 01:08 AM