mot
Warn
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONCREDENTIALS_UNSAFE
Full Analysis
- [COMMAND_EXECUTION] (MEDIUM): The skill makes extensive use of the
Bashtool to perform system audits and modifications. - Evidence: It executes
chmod +x .claude/hooks/*.shandnpm run buildwhen the--fixflag is provided. - Risk: While intended for maintenance, arbitrary modification of file permissions and execution of build scripts can be abused if an attacker can place malicious files in the
.claudedirectory. - [CREDENTIALS_UNSAFE] (MEDIUM): The skill accesses and utilizes the
DATABASE_URLenvironment variable to verify PostgreSQL connectivity. - Evidence: Found in Phase 4:
psql "$DATABASE_URL" -c "SELECT 1". - Risk: Database URLs typically contain plaintext credentials (username/password). Passing these directly to shell commands can leak sensitive information to process lists or logs.
- [INDIRECT_PROMPT_INJECTION] (LOW): The skill ingests data from untrusted local files to perform audits.
- Ingestion points: Reads from
.claude/skills/,.claude/agents/, and.claude/settings.json. - Boundary markers: None identified. It uses
grepandsedto extract strings from these files. - Capability inventory: Can perform file existence checks and trigger
chmodornpm buildbased on audit results. - Sanitization: Minimal. It uses standard unix utilities (
cut,sed,xargs) to process extracted data. - [REMOTE_CODE_EXECUTION] (LOW): The skill uses
uv run pythonandnpm run buildwhich rely on the local environment's configuration and dependencies. - Risk: If
package.jsonor Python environment files are tampered with, these commands will execute attacker-controlled code.
Audit Metadata