implementation
Pass
Audited by Gen Agent Trust Hub on Apr 26, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [DYNAMIC_EXECUTION]: The script
scripts/health-check.shretrieves a command string from the.claude/config/project.jsonconfiguration file and executes it using theevalcommand. This pattern is designed for flexibility in project-specific health checks but introduces a risk of arbitrary command execution if the local configuration file is modified by an untrusted source.- [INDIRECT_PROMPT_INJECTION]: The skill's automation scripts (e.g., for commits and health checks) rely on data from local JSON files likefeature-list.jsonandproject.json. Because this data is used in shell execution and commit messages without explicit sanitization, it creates a surface for indirect prompt injection. - Ingestion points: Project configuration file (
.claude/config/project.json) and feature tracking data (.claude/progress/feature-list.json). - Boundary markers: None identified.
- Capability inventory: Shell command execution (including
evaland background jobs), file system modifications viajq, and git repository management. - Sanitization: The scripts rely on
jqfor data extraction but do not perform additional validation on the extracted strings before using them in sensitive operations.
Audit Metadata