skill-manager
Fail
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [Indirect Prompt Injection] (HIGH): The skill defines a 'Update Workflow' in
SKILL.mdthat fetches README files from remote GitHub repositories and instructs the agent to refactor localSKILL.mdandwrapper.pyfiles. - Ingestion points: The agent fetches remote README content based on
github_urlmetadata inscripts/scan_and_check.py. - Boundary markers: None. The agent is simply told to 'Refactor' based on the new content.
- Capability inventory: The agent has the capability to write/overwrite
SKILL.mdandwrapper.pyfiles (as described in Workflow 2). - Sanitization: None. The agent processes untrusted remote text and converts it into local code.
- [Command Execution] (HIGH): The script
scripts/delete_skill.pyis vulnerable to path traversal. It usesos.path.join(root, skill_name)whereskill_nameis a command-line argument. On Windows, if an absolute path is provided as the second argument tojoin, it overrides the first, allowing the agent or a user to delete arbitrary directories (e.g.,C:\WindowsorC:\Users\<user>\Documents). - [Data Exposure] (LOW): Multiple scripts (
delete_skill.py,list_skills.py,scan_and_check.py) contain hardcoded file paths (C:\Users\20515\.claude\skills). This exposes the host's specific username and directory structure. - [Command Execution] (MEDIUM):
scripts/scan_and_check.pyexecutesgit ls-remoteusing URLs parsed from other skills' metadata. While it avoids shell execution by using a list of arguments, it still interacts with potentially malicious remote servers via thegitprotocol based on untrusted local metadata.
Recommendations
- AI detected serious security threats
Audit Metadata