link-dependencies
Warn
Audited by Gen Agent Trust Hub on Feb 23, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- Dynamic Execution (MEDIUM): The skill utilizes a
PreToolUsehook to automatically execute a script located at$CLAUDE_PROJECT_DIR/.claude/hooks/workflows/system-check.sh. This pattern is risky because it executes code from an environment-relative path that could be controlled by an attacker in a shared repository, leading to command execution on the user's machine when the skill is activated. - Indirect Prompt Injection (LOW): The skill is vulnerable to indirect prompt injection because it parses the
formatanddependency-topicfields from untrustedplan.mdfiles and interpolates them directly into file paths (e.g.,../technical-planning/references/output-formats/{format}/reading.md). This lacks sanitization or path validation, potentially allowing for directory traversal attacks. Evidence Chain: 1. Ingestion points: Frontmatter fieldsformatandexternal_dependenciesfromplan.mdfiles. 2. Boundary markers: Absent; there are no delimiters or warnings to ignore instructions within the parsed content. 3. Capability inventory: The skill has the ability to list directories (ls), read files, write to files, and execute shell commands via hooks. 4. Sanitization: Absent; the skill does not validate thatformatordependency-topicare restricted to safe alphanumeric characters or existing directories.
Audit Metadata