planning-with-files
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTIONDATA_EXFILTRATION
Full Analysis
- [Privilege Escalation] (HIGH): The skill's
Stophook and manual recovery instructions utilizepowershell -ExecutionPolicy Bypassandpwsh -ExecutionPolicy Bypass. This explicitly instructs the system to ignore security configurations designed to prevent the execution of untrusted scripts, creating a significant privilege escalation vector.\n- [Dynamic Execution] (MEDIUM): The skill executes multiple shell and python scripts (session-catchup.py,check-complete.sh) using paths derived from environment variables likeCLAUDE_PLUGIN_ROOT. This relies on the security of the environment and the installation directory, as execution from computed paths is a common vector for local privilege escalation or persistence if the directory is writable.\n- [Indirect Prompt Injection] (LOW): The skill implements a '2-Action Rule' requiring the agent to save findings fromWebFetchandWebSearchintofindings.md. 1. Ingestion points: WebFetch and WebSearch results are processed. 2. Boundary markers: None are specified for the saved content. 3. Capability inventory: The agent hasBashandWriteaccess. 4. Sanitization: There are no instructions for sanitizing or escaping the content before writing it to markdown files that are later re-read to influence agent logic.\n- [Data Exposure] (LOW): ThePreToolUsehook automatically executescat task_plan.mdbefore any tool call (includingWebFetch). While intended to maintain context, this pattern automatically exposes internal planning data to the context window just before the agent interacts with potentially malicious external web services.
Recommendations
- AI detected serious security threats
Audit Metadata