automated-assessment
Warn
Audited by Gen Agent Trust Hub on Mar 16, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/run-checkpoints.shscript uses theevalcommand to execute arbitrary shell strings provided in thepatternfield ofcommand-type checkpoints. These checkpoints are sourced fromcheckpoints.yamlfiles discovered in the local plugin cache. - [COMMAND_EXECUTION]: The script uses
evalto perform shell expansion (brace and glob expansion) ontargetpaths within thefile_exists,contains, andregexcheck types. This allows for unintended shell command execution if a checkpoint target contains shell metacharacters. - [PROMPT_INJECTION]: The skill processes untrusted project data (e.g., README.md, source code) and external rubrics during LLM-based reviews, which presents a surface for indirect prompt injection.
- Ingestion points: Project files and
checkpoints.yamlfiles discovered in~/.claude/plugins/cache/(referenced inreferences/checkpoint-workflow.md). - Boundary markers: The agent prompt template includes instructions to verify only the provided checkpoints and return a specific JSON format, acting as a delimiter.
- Capability inventory: The skill possesses the capability to execute shell commands via
scripts/run-checkpoints.shand create GitHub issues using thegh_apitype and--create-issuesflag. - Sanitization: No evidence of sanitization or escaping of external content before interpolation into prompts was found.
- [EXTERNAL_DOWNLOADS]: The skill interacts with the GitHub API via the
gh_apicheckpoint type to verify repository metadata such as topics and labels. - [DATA_EXFILTRATION]: The discovery mechanism in
references/checkpoint-workflow.mdexplicitly scans the internal agent plugin cache directory (~/.claude/plugins/cache/*/skills/*/) to read configuration and instruction files from other installed skills.
Audit Metadata