ccusage
Fail
Audited by Gen Agent Trust Hub on Mar 12, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill uses
npx ccusage@latestacross multiple commands inREADME.mdandSKILL.md. This pattern downloads and executes the latest code from an external npm package authored by a third party (ryoppippy) at runtime. Executing unverified remote code without version pinning can lead to supply chain attacks if the external package is compromised. - [EXTERNAL_DOWNLOADS]: Fetches executable content from the public npm registry during normal operation.
- [COMMAND_EXECUTION]: Executes shell commands including
npxand shell substitutions like$(date +%Y%m%d)to generate reports. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection as it ingests untrusted data from Claude Code logs.
- Ingestion points: Reads JSON output from
ccusagewhich contains project names, session IDs, and file paths (referenced inSKILL.md). - Boundary markers: No delimiters or instructions are provided to the agent to ignore instructions embedded within the usage data.
- Capability inventory: The agent has the ability to execute shell commands (
npx) as defined inSKILL.md. - Sanitization: There is no evidence of sanitization or filtering applied to the data returned by the usage tool before it is presented to the agent.
Recommendations
- AI detected serious security threats
Audit Metadata