queue
Pass
Audited by Gen Agent Trust Hub on Feb 27, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes local TypeScript scripts using the Bun runtime (e.g.,
bun run "${CLAUDE_PLUGIN_ROOT}"/scripts/queue.ts). - [COMMAND_EXECUTION]: The database schema in
references/schema-reference.mddefines multiple fields intended to store and execute shell commands, includingscaffold_command,run_command,test_command, andrun_instructions. - [PROMPT_INJECTION]: The skill has a surface for indirect prompt injection via untrusted data stored in the database.
- Ingestion points: Data is read from the
articlesandsettingstables in the.article_writer/article_writer.dbSQLite database, specifically from fields liketitle,sources_used, andcompanion_project. - Boundary markers: No explicit boundary markers or instructions to ignore embedded commands are documented for the data fields.
- Capability inventory: The skill possesses the ability to execute commands via
bun runand potentially via the command strings stored in the database's JSON columns. - Sanitization: There is no evidence of sanitization or validation logic to prevent malicious command injection within the command-bearing fields.
Audit Metadata