windows-terminal
Pass
Audited by Gen Agent Trust Hub on Mar 22, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill facilitates the creation of terminal windows and the execution of shell commands via Node.js child processes.
- Evidence:
SKILL.mdcontains multiple examples usingchild_process.spawnto launchwt.exe,cmd.exe, andpowershell.exewith detached process configurations. - [PROMPT_INJECTION]: The instructions explicitly describe how to bypass an environment-based safety restriction designed to prevent nested tool execution.
- Evidence:
SKILL.mdprovides guidance on unsetting theCLAUDECODEvariable (set CLAUDECODE=) to allow the Claude CLI to run within a session it would otherwise refuse to enter. - [PROMPT_INJECTION]: The skill exposes an indirect prompt injection surface by accepting arbitrary command strings for execution in a shell environment.
- Ingestion points: The
commandproperty inschemas/input.schema.jsonallows up to 256 characters of input. - Boundary markers: Absent in the provided implementation examples in
SKILL.md. - Capability inventory: Full access to
child_process.spawnand shell environments (cmd.exe,bash,powershell). - Sanitization: While a
sanitizeWtArgfunction is provided for terminal titles and profiles, it is not applied to the primarycommandstring that is executed.
Audit Metadata