sonarr
Pass
Audited by Gen Agent Trust Hub on Apr 6, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTIONCREDENTIALS_UNSAFE
Full Analysis
- [PROMPT_INJECTION]: The
SKILL.mdfile uses coercive language ("MANDATORY SKILL INVOCATION", "YOU MUST", "Failure... violates your operational requirements") designed to override the agent's natural tool selection process. - [COMMAND_EXECUTION]: The skill heavily utilizes a bash script (
scripts/sonarr.sh) that executes shell commands includingcurlandjqto interact with the local environment and the Sonarr API. - [DATA_EXPOSURE]: The skill explicitly retrieves sensitive credentials (API keys) from the local filesystem (
~/.claude-homelab/.env) through theload-env.shlibrary. - [INDIRECT_PROMPT_INJECTION]: The skill processes external data such as TV show titles and descriptions fetched from the Sonarr API, which could serve as an attack vector if the source data is controlled by an adversary.
- Ingestion points: Data enters the agent's context through API responses processed in
scripts/sonarr.sh(commands:search,exists,add). - Boundary markers: None identified; the output of the API is presented directly to the agent without delimiters or warnings.
- Capability inventory: The skill allows shell command execution, network requests, and the ability to delete files (via the
removecommand). - Sanitization: While the script uses
jqfor JSON handling and URI encoding for search terms, it does not sanitize the text content (titles/descriptions) before presenting it to the agent's prompt.
Audit Metadata