contextkeeper
Fail
Audited by Gen Agent Trust Hub on Mar 5, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/ckpt.shscript is vulnerable to shell command injection. It uses an unquoted heredoc (<< JSON) to generate checkpoint files, which causes the shell to evaluate command substitution patterns (e.g.,$(...)or backticks) within the$SAFE_MESSAGE,$SAFE_BRANCH, and$SAFE_RECENT_COMMITSvariables at runtime. These variables are derived from user input or git metadata. - [COMMAND_EXECUTION]: The
scripts/dashboard.shscript is vulnerable to command injection when parsing checkpoints. It extracts thetimestampfield usinggrepandsedand interpolates it directly into apython3 -ccommand string, allowing for arbitrary code execution if the checkpoint file contains a malicious payload. - [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface. It ingests untrusted data from git branch names, filenames, and commit messages (ingestion points) and stores them in JSON files (boundary). The skill possesses the capability to execute shell commands and file writes (capability inventory). While a
json_escapefunction is present (sanitization), it fails to escape characters that trigger shell expansion, allowing metadata from external repositories to influence script execution.
Recommendations
- AI detected serious security threats
Audit Metadata