orchestrator
Fail
Audited by Gen Agent Trust Hub on Apr 26, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/session-entry.shand corresponding documentation inreferences/session-management.mdimplement a health check mechanism that reads a command string from thehealth_checkfield of a local configuration file (.claude/config/project.json) and executes it using theevalcommand. This enables arbitrary command execution on the host environment if the configuration file is provided by an untrusted source or included in a malicious project repository. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection through its session resumption and context loading logic. (1) Ingestion points: The agent is instructed to read session summaries from the shared
/tmp/summary/directory and project-specific files such as.claude/progress/checkpoint_summary.mdand.claude/config/project.json. (2) Boundary markers: The resumption templates inreferences/session-resumption.mdinterpolate these summaries directly into the agent's prompt context without using delimiters or instructions to ignore embedded commands. (3) Capability inventory: The skill possesses significant capabilities including shell command execution (eval), filesystem manipulation (mkdir,jq,cat), and git operations. (4) Sanitization: No sanitization or validation of the content retrieved from these external files is performed before it is processed or executed.
Recommendations
- AI detected serious security threats
Audit Metadata