project-hook-setup
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- COMMAND_EXECUTION (CRITICAL): The hook script
templates/verify-health.pyexecutes ahealth_checkstring read from.claude/config/project.jsonusingsubprocess.run(shell=True). Additionally,templates/session-entry.shusesevalto execute the same configuration value, providing multiple paths for arbitrary shell injection. - REMOTE_CODE_EXECUTION (HIGH): The skill implements an 'Indirect Prompt Injection' surface (Category 8). By processing instructions (commands) from a file within the workspace and executing them during
PreToolUselifecycle events, it allows a malicious repository to gain full control over the agent's execution environment. Ingestion point:.claude/config/project.json. Boundary markers: None. Capability inventory:subprocess.run(shell=True),eval. Sanitization: None. - COMMAND_EXECUTION (HIGH):
templates/verify-tests.pyexecutes atest_commandfrom the configuration file viasubprocess.run, which can be exploited if the command string contains malicious arguments. - PROMPT_INJECTION (LOW): The skill documentation suggests it is integrated into an automated
INITstate by aninitializerskill, which could be used to force the installation of these vulnerable hooks without explicit user consent in a new project.
Recommendations
- AI detected serious security threats
Audit Metadata