orchestrator
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- COMMAND_EXECUTION (HIGH): The script
scripts/session-entry.shextracts thehealth_checkvalue from.claude/config/project.jsonand executes it using theevalcommand. This creates a direct path for arbitrary code execution if an attacker can modify the project's configuration file. - COMMAND_EXECUTION (MEDIUM): The
scripts/session-entry.shscript executes an external dependency script located at.skills/initialization/scripts/check-dependencies.sh. Executing unverified scripts from relative paths outside the skill's own directory increases the risk of executing malicious local code. - PROMPT_INJECTION (LOW): In
scripts/enter-state.sh, the script constructs a JSON state file by manually interpolating the$FEATURE_IDvariable into a string. This is vulnerable to schema confusion or indirect injection if a feature ID contains characters like double quotes, which could alter the structure of the resulting.claude/progress/state.jsonfile.
Recommendations
- AI detected serious security threats
Audit Metadata