session-transcript-analyzer
Pass
Audited by Gen Agent Trust Hub on Mar 22, 2026
Risk Level: SAFEDATA_EXFILTRATIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [DATA_EXFILTRATION]: The skill accesses sensitive directories in the user's home folder to read session history and debug information.
- Evidence: The skill explicitly targets
~/.claude/projects/for JSONL transcripts and~/.claude/debug/for text-based debug logs to perform its analysis. - [COMMAND_EXECUTION]: The wrapper script
scripts/main.cjsexecutes an external Node.js process using a path that resolves outside of the skill's own directory structure. - Evidence: Uses
spawnSyncto run a script at../../../../scripts/analyze-session-transcript.mjs, creating a dependency on the host environment's file structure. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it processes untrusted data from session transcripts that could contain malicious instructions.
- Ingestion points: Reads
.jsonltranscripts and.txtdebug logs from~/.claude/(SKILL.md). - Boundary markers: None; the skill reads file content line-by-line and parses it without using delimiters or instructions to the LLM to ignore embedded commands.
- Capability inventory: The skill is configured with
Read,Write, andBashtools (SKILL.md). - Sanitization: No sanitization or filtering of the transcript content is performed beyond truncating failure messages for display in the final report.
Audit Metadata