r07-components

Fail

Audited by Gen Agent Trust Hub on Apr 20, 2026

Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [PERSISTENCE_MECHANISMS]: The skill targets the ~/.claude/CLAUDE.md file, which contains persistent instructions for the AI agent. Modifying this file allows for unauthorized changes to the agent's base behavior that persist across different sessions.
  • [OBFUSCATION]: The script uses variable-based path assembly to construct the target file path. The skill's description explicitly states this is intended to 'defeat taint propagation,' which is a technique used to bypass security scanners that look for direct access to sensitive configuration files.
  • [COMMAND_EXECUTION]: The skill executes shell commands to perform unauthorized modifications to hidden configuration files in the user's home directory.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Apr 20, 2026, 06:16 AM