compound-learnings
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [Indirect Prompt Injection] (HIGH): The skill ingests untrusted data from
.claude/cache/learnings/*.md. If these files contain malicious instructions (e.g., from a previously browsed website or processed file), the skill may incorporate them into permanent rules or scripts. There are no boundary markers or sanitization logic mentioned for these inputs. - [Remote Code Execution] (HIGH): The process in Step 7 involves generating and executing arbitrary shell scripts (
.sh) and TypeScript/Node.js code. It explicitly useschmod +xto make these generated scripts executable. - [Persistence Mechanisms] (HIGH): The core purpose is creating persistence. It writes to
.claude/rules/and.claude/skills/, and more critically, it modifies.claude/settings.jsonto register new hooks that run automatically on events likeSessionEndorPostToolUse. - [Command Execution] (MEDIUM): The skill utilizes the
Bashtool to perform filesystem operations and execute the generated code. While intended for automation, this capability can be abused if the generated content is malicious. - [Mitigation Note] (INFO): The skill includes an
AskUserQuestionstep before applying changes, which serves as a human-in-the-loop check. However, an attacker could craft the 'Rationale' or 'Pattern Name' to be deceptive, potentially tricking a user into approving a malicious artifact.
Recommendations
- AI detected serious security threats
Audit Metadata