command-center
Warn
Audited by Gen Agent Trust Hub on Mar 8, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill frequently executes system utilities (such as
uptime,df,top,mpstat, andiostat) and theopenclawCLI to collect metrics and manage agent sessions. Most commands are restricted via a dedicated allowlist insrc/actions.jsand use safe execution wrappers that avoid shell injection. - [COMMAND_EXECUTION]: Elevated privileges are requested via
sudoinsrc/vitals.jsto access hardware sensors (powermetrics) on Apple Silicon and in installation scripts for system-level dependencies. - [REMOTE_CODE_EXECUTION]: The skill uses dynamic imports in
src/jobs.jsto load job logic from a path determined by the workspace configuration (CONFIG.paths.jobs), which could allow arbitrary code execution if the jobs directory is compromised. - [PROMPT_INJECTION]: A potential surface for indirect prompt injection exists because the skill analyzes untrusted agent transcripts from the workspace to generate session summaries and detect topics. While the frontend escapes HTML for display, the analysis logic lacks boundary markers or explicit instructions to ignore malicious content embedded within transcripts.
- [DATA_EXFILTRATION]: The skill includes a Linear integration (
scripts/linear-sync.js) that transmits session metadata toapi.linear.app. This is a documented feature requiring a user-provided API key.
Audit Metadata