codeck-outline
Warn
Audited by Gen Agent Trust Hub on Apr 2, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill constructs shell commands using variables derived from the local environment, specifically
DECK_DIR="$HOME/.codeck/projects/$(basename "$(pwd)")". Using$(basename "$(pwd)")inside double quotes allows for command injection if the current working directory name contains shell metacharacters such as backticks or subshell syntax. - [COMMAND_EXECUTION]: The use of
evalto execute afindcommand string inSKILL.mdis a risky pattern. While the exclusion list is static, theevalcontext can be exploited if the directory structure or filenames contain malicious characters designed to break out of the command string. - [EXTERNAL_DOWNLOADS]: The instructions explicitly direct the agent to "search the web" to fill information gaps or verify terminology. This involves fetching data from remote, unverified sources which could contain malicious or biased content.
- [REMOTE_CODE_EXECUTION]: The skill executes a local shell script located at
$HOME/.claude/skills/codeck/scripts/status.sh. While this script is intended to be part of the skill's infrastructure, executing scripts from variable paths in the home directory is a high-risk operation if the installation environment is compromised. - [PROMPT_INJECTION]: The skill processes untrusted user data from the local project directory (Markdown, PDF, DOCX, etc.) without explicit boundary markers or sanitization logic. This creates an indirect prompt injection surface where instructions embedded within these documents could override the agent's editorial persona or primary instructions.
- Ingestion points: Files in the current working directory scanned via
findand read via theReadtool (referenced inSKILL.md). - Boundary markers: Absent. No specific delimiters or "ignore instructions" warnings are used when processing material content.
- Capability inventory: File system writes (
mkdir), directory scanning (find), and shell script execution (bash) as defined inSKILL.md. - Sanitization: Absent. Content is processed directly for narrative extraction.
Audit Metadata