ccboard
Fail
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The installation scripts fetch the Rust toolchain installer from https://sh.rustup.rs and pipe it to the shell. While an automated scanner flagged this URL, it is the well-known official installer for the Rust programming language.
- [EXTERNAL_DOWNLOADS]: The skill installs the ccboard utility from the official Rust package registry via cargo install.
- [DATA_EXFILTRATION]: The skill reads sensitive information including conversation history and configuration files from the ~/.claude/ directory to provide monitoring and analytics. This data is displayed in the dashboard and can be served locally via a web interface.
- [COMMAND_EXECUTION]: The skill invokes the ccboard binary to launch the TUI and web dashboard and uses system commands to verify MCP server status.
- [PROMPT_INJECTION]: The skill processes untrusted content from Claude Code session logs, creating an indirect injection surface. 1. Ingestion points: session files in ~/.claude/projects/. 2. Boundary markers: none identified in skill scripts. 3. Capability inventory: local binary execution and file access. 4. Sanitization: logic resides within the ccboard binary.
Recommendations
- HIGH: Downloads and executes remote code from: https://sh.rustup.rs - DO NOT USE without thorough review
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata