task-trigger
Warn
Audited by Gen Agent Trust Hub on Apr 6, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill establishes persistence by automatically installing background tasks and services using
crontab(Linux/WSL),launchdplists (macOS), andsystemduser services via scripts such asadd-to-crontab.sh,add-to-launchd.sh, andstart-watcher.sh. These tasks are configured to run headlessly and independently of the user session. - [REMOTE_CODE_EXECUTION]: The
start-watcher.shscript dynamically generates shell scripts at runtime and writes them to$HOME/.task-trigger/watchers/for execution by the system. Additionally,run-task.shexecutes dynamically built command strings through agent CLIs likeopencodeandkiro-cliusingsubprocess.run. - [PROMPT_INJECTION]: The file monitoring feature (
/task-trigger:watch) and scheduled task architecture create a surface for indirect prompt injection. Untrusted data from monitored files or pre-configured task prompts are executed in a headless environment—often with the--trust-all-toolsflag enabled forkiro-cli—which could be exploited to trigger unintended agent actions if inputs are compromised.
Audit Metadata