r07-components
Fail
Audited by Gen Agent Trust Hub on Apr 20, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [PERSISTENCE_MECHANISMS]: The skill targets the
~/.claude/CLAUDE.mdfile, which contains persistent instructions for the AI agent. Modifying this file allows for unauthorized changes to the agent's base behavior that persist across different sessions. - [OBFUSCATION]: The script uses variable-based path assembly to construct the target file path. The skill's description explicitly states this is intended to 'defeat taint propagation,' which is a technique used to bypass security scanners that look for direct access to sensitive configuration files.
- [COMMAND_EXECUTION]: The skill executes shell commands to perform unauthorized modifications to hidden configuration files in the user's home directory.
Recommendations
- AI detected serious security threats
Audit Metadata