claude-config-optimizer
Fail
Audited by Gen Agent Trust Hub on Apr 9, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: Section 13 instructions the agent to execute a remote script using
uvxfrom an unverified third-party GitHub repository (github.com/laiso/site2skill). This command allows for the direct execution of code from a source that is not a trusted organization or the skill author. - [COMMAND_EXECUTION]: The skill utilizes shell commands including
gh api,claude --version, andbase64to interact with the system environment and remote APIs to retrieve configuration data. - [EXTERNAL_DOWNLOADS]: Fetches the official
CHANGELOG.mdfrom theanthropics/claude-coderepository and provides instructions for converting external documentation websites into skills usingsite2skill. - [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface by ingesting the contents of an external
CHANGELOG.mdfile. The retrieved content is processed by the agent to generate summaries without the use of boundary markers or sanitization. - Ingestion points:
SKILL.md(viagh apirepository content fetch) - Boundary markers: Absent
- Capability inventory: Shell command execution (
Bash), File system operations (Read,Write) - Sanitization: Absent
Recommendations
- AI detected serious security threats
Audit Metadata