implementation
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- COMMAND_EXECUTION (HIGH): The script
scripts/health-check.shusesevalto run commands fetched directly from thehealth_checkkey in.claude/config/project.json. This allows for arbitrary command execution if the configuration file is controlled by an untrusted source. - PROMPT_INJECTION (LOW): The skill is susceptible to Indirect Prompt Injection (Category 8). Ingestion points: Reads data from
.claude/config/project.jsonand.claude/progress/feature-list.json. Boundary markers: None present; the skill trusts the content of these files. Capability inventory: Can execute shell commands viaeval, perform git commits, and modify local JSON files. Sanitization: None; variables are interpolated directly into shell and jq command strings. - DATA_EXFILTRATION (LOW): Several scripts, including
scripts/get-current-feature.shandscripts/mark-feature-complete.sh, use shell variable interpolation insidejqfilters (e.g.,select(.id == "'$FEATURE_ID'")) instead of the safer--argflag. This could allow for data manipulation or unintended data extraction if the variable content is manipulated.
Recommendations
- AI detected serious security threats
Audit Metadata