analyze-session
Pass
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: SAFEPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection (Category 8) as it processes untrusted session transcripts and passes them to subagents for analysis without protective measures.
- Ingestion points: Untrusted data is ingested from
.claude/sessions-to-analyze.mdand through message content retrieved via themcp__ccrider__get_session_messagestool. - Boundary markers: The prompt for the Sonnet and Haiku subagents lacks explicit delimiters or "ignore embedded instructions" warnings to prevent the model from obeying commands hidden within the transcripts.
- Capability inventory: The skill possesses capabilities to read files, create directories, write files to the local
.claude/directory, and spawn subagents. - Sanitization: No escaping, validation, or filtering is applied to the session messages before they are provided to the subagents for analysis.
- [EXTERNAL_DOWNLOADS]: The skill relies on an external, untrusted third-party MCP to function.
- Evidence: It requires the installation of
ccriderfromhttps://github.com/neilberkman/ccrider, which is not a verified or trusted vendor listed in the security policy.
Audit Metadata