model-usage
Pass
Audited by Gen Agent Trust Hub on Feb 28, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/model_usage.pyexecutes thecodexbarCLI utility viasubprocess.check_output. It uses a structured list of arguments, which is a secure implementation that prevents shell injection vulnerabilities. - [EXTERNAL_DOWNLOADS]: The skill metadata in
SKILL.mdspecifies an installation step using Homebrew (brew cask) from thesteipete/tap/codexbarrepository to provide the necessarycodexbarbinary. Additionally, the documentation references a local install script./bin/install-codexbar-cli.shwhich is not included in the provided skill files. - [DATA_EXFILTRATION]: The skill accesses local usage logs from directories such as
~/.codex/and~/.config/claude/to retrieve token and cost information. This data access is essential for the skill's primary purpose of summarizing usage and occurs entirely on the local system. - [PROMPT_INJECTION]: The skill possesses an indirect prompt injection surface as it processes data from local logs or user-provided files. Evidence Chain: 1. Ingestion points: Data enters via
codexbarJSON output or the--inputfile inscripts/model_usage.py. 2. Boundary markers: No delimiters or "ignore instructions" warnings are used to distinguish log content from agent instructions. 3. Capability inventory: The script usessubprocess.check_outputto execute thecodexbarCLI. 4. Sanitization: No escaping or validation is performed on model names or other strings retrieved from logs before including them in the summary output.
Audit Metadata