trellis-meta
Warn
Audited by Gen Agent Trust Hub on Mar 4, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The skill documents the use of the
--dangerously-skip-permissionsflag with the Claude CLI in automation scripts (e.g.,multi_agent/start.py). This flag explicitly bypasses the AI's safety prompts for tool use, allowing automated execution of commands without human oversight. - [COMMAND_EXECUTION]: Multiple agents defined in the system (
dispatch,plan,implement,check,debug) are grantedBashandWritetool permissions, enabling them to execute arbitrary system commands and modify files. - [REMOTE_CODE_EXECUTION]: The 'Ralph Loop' quality enforcement system (
ralph-loop.py) and thepost_createhook inworktree.yamlexecute arbitrary shell commands defined in user-editable configuration files. This allows for the execution of arbitrary code during the automated workflow lifecycle. - [DATA_EXFILTRATION]: The system is designed to copy sensitive environment files, such as
.envand.env.local, between directories during 'worktree' creation. While intended for local development isolation, this mechanism handles sensitive project secrets. - [PROMPT_INJECTION]: The
inject-subagent-context.pyhook performs prompt interpolation by reading contents from various files (as defined in JSONL files) and prepending them to the agent's instructions. This creates a surface for indirect prompt injection where malicious content in a project file could override agent behavior. - Ingestion points: Files listed in
*.jsonl(e.g.,implement.jsonl,check.jsonl) and requirements inprd.md. - Boundary markers: Uses simple text headers like
=== [filename] ===to delimit injected content. - Capability inventory: Agents have access to
Bash,Write,Edit, and theTasktool (subagent invocation). - Sanitization: No explicit sanitization or escaping of the injected file contents is documented.
Audit Metadata