agent-creator
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- COMMAND_EXECUTION (HIGH): The skill provides templates and mandatory instructions for implementing validation hooks that execute shell scripts during file operations.
- Evidence:
SKILL.mdandreferences/hooks.mddetail the use ofPreToolUsehooks to runbash ${CLAUDE_PLUGIN_ROOT}/scripts/validate-solid.shbeforeWriteorEdittools. - REMOTE_CODE_EXECUTION (HIGH): The skill directs the agent to generate its own executable logic and then execute it within the environment. This pattern allows for the persistent execution of arbitrary code via automated hooks.
- Evidence:
references/templates/hook-scripts.mdprovides several bash script templates designed to be written and executed by the agent. - PRIVILEGE_ESCALATION (MEDIUM): The skill repeatedly instructs the agent to modify file permissions to enable execution of generated scripts.
- Evidence:
chmod +x plugins/<plugin>/scripts/*.shinstructions inSKILL.mdandreferences/templates/hook-scripts.md. - INDIRECT_PROMPT_INJECTION (HIGH): The skill creates an architecture where agents with 'Write' and 'Bash' capabilities ingest untrusted external data without sanitization.
- Ingestion points:
references/templates/agent-template.mdspecifies the use ofmcp__exa__web_search_exaandmcp__context7__query-docs. - Boundary markers: Absent in the templates; external data is processed directly.
- Capability inventory: Templates grant
Write,Edit, andBashtools by default. - Sanitization: No sanitization or validation of external content is present in the instruction set or hook logic.
Recommendations
- AI detected serious security threats
Audit Metadata