skill-forge
Pass
Audited by Gen Agent Trust Hub on Apr 8, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/forge.pyutilizessubprocess.runto execute specific Python scripts for evaluation and orchestration. These scripts are located in predictable paths within the user's home directory (~/.claude/skills/) and are part of the intended integration between development tools.\n- [PROMPT_INJECTION]: The skill has an indirect prompt injection surface because it extracts and reuses content from externalSKILL.mdandskill_spec.yamlfiles. \n - Ingestion points: Content is ingested from user-provided file paths in
scripts/task_suite_generator.pyandscripts/forge.py.\n - Boundary markers: The output
task_suite.yamldoes not employ delimiters to isolate extracted text within generated prompts or rubrics.\n - Capability inventory: The skill performs file system writes and executes specific local scripts via subprocess.\n
- Sanitization: Extracted text is used without robust sanitization, relying on regex for basic structure extraction rather than security filtering.
Audit Metadata