tool-creator
Warn
Audited by Gen Agent Trust Hub on Mar 7, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTIONREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill's instructions guide the agent to apply execution permissions (
chmod 755) to dynamically created script files using theBashtool. - [REMOTE_CODE_EXECUTION]: The skill generates and writes executable
.cjsfiles by interpolating a user-providedimplementationstring into a template. This allows for the persistent storage and subsequent execution of arbitrary code within the framework's tools directory. - [PROMPT_INJECTION]: The skill exposes an indirect prompt injection surface by ingesting an
implementationargument without sanitization or validation before writing it to an executable file. - Ingestion points: The
implementationparameter in thecreateToolfunction withinscripts/main.cjsand theargs.implementationdefined inSKILL.md. - Boundary markers: No explicit delimiters, escaping, or guardrail instructions are used when interpolating the implementation string into the JavaScript template.
- Capability inventory: The skill utilizes
WriteandBashcapabilities to create and authorize executable tools. - Sanitization: The skill lacks code-level validation or sanitization for the provided implementation string.
- [REMOTE_CODE_EXECUTION]: The skill references local utility scripts (e.g.,
.claude/lib/creator-commons.cjs) for integration and validation which are external to the analyzed skill package, making their specific logic unverifiable in this context.
Audit Metadata