planning-with-files
Fail
Audited by Gen Agent Trust Hub on Feb 18, 2026
Risk Level: HIGHDATA_EXFILTRATIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- Data Exposure & Exfiltration (HIGH): The
scripts/session-catchup.pyscript programmatically accesses the~/.claude/projectsdirectory to read.jsonlsession log files. These files contain the full history of user and agent interactions, which constitutes sensitive personal and operational data. - Privilege Escalation (HIGH): The
Stophook inSKILL.mdand thescripts/check-complete.shlogic (when falling back to PowerShell) use the-ExecutionPolicy Bypassflag. This is a known technique for circumventing system-level security policies that restrict the execution of unsigned or local scripts. - Indirect Prompt Injection (LOW): The session recovery feature creates an attack surface by re-injecting data from previous interactions into the current context without sanitization.
- Ingestion points:
session-catchup.pyreading historical project logs. - Boundary markers: Absent; the output is prefixed with simple text headers that do not prevent the model from following instructions contained within the logs.
- Capability inventory: The skill possesses extensive capabilities including
Bashexecution and file modification (Write,Edit). - Sanitization: None; the script performs raw extraction of text and tool usage history.
Recommendations
- AI detected serious security threats
Audit Metadata