Hooks Automation
Audited by Gen Agent Trust Hub on Feb 13, 2026
================================================================================
🔴 VERDICT: HIGH
This skill presents a HIGH risk due to its reliance on an unverified external dependency, the potential for command injection through unsanitized parameters, and the establishment of persistence mechanisms via Git hooks. The skill's core functionality involves executing commands and scripts, which, if compromised or misused, could lead to arbitrary code execution and unauthorized actions.
Total Findings: 5
🔴 HIGH Findings: • Command Execution / Injection
- configuration.md: The
commandfields in the JSON configuration (e.g.,"command": "npx claude-flow hook pre-edit --file '${tool.params.file_path}'") directly interpolate${tool.params.file_path}and${tool.params.command}into shell commands. If these parameters are not rigorously sanitized by theclaude-flowCLI, an attacker could inject malicious commands (e.g.,'; rm -rf /; #') leading to arbitrary code execution. This is a critical command injection vulnerability. • Persistence Mechanism - examples.md: The skill provides instructions to add scripts to
.git/hooks/pre-commit,.git/hooks/post-commit, and.git/hooks/pre-push. These Git hooks establish persistence within a repository, allowing arbitrary commands to be executed automatically on Git events (commit, push), which can be exploited for malicious purposes. • Arbitrary Code Execution (Custom Hooks) - examples.md: The 'Custom Hook Creation' section demonstrates how to register and execute custom JavaScript files (e.g.,
.claude/hooks/custom-quality-check.js). Theexecutefunction in these custom hooks receivescontext(includingfileandcontent), which, if not carefully controlled and validated, could allow for arbitrary code execution within the skill's environment.
🟡 MEDIUM Findings: • Unverifiable Dependency
- SKILL.md: The skill requires the installation of
claude-flowCLI vianpm install -g claude-flow@alpha. This is an external dependency that is not part of the trusted GitHub repositories or organizations, making its contents and behavior unverifiable at analysis time. This introduces a supply chain risk. • Conditional Attack Trigger - examples.md: The
pre-pushhook example includes conditional logic (if (( $(echo "$TRUTH_SCORE < 0.95" | bc -l) ))) that gates behavior based on a calculated score. While not directly malicious, such conditional triggers can be used to delay or hide malicious actions until specific conditions are met.
🔵 LOW Findings: • No Low Findings
ℹ️ TRUSTED SOURCE References: • GitHub Commit Reference
- _meta.json: The
latest.commitfield references a GitHub commit URL (https://github.com/clawdbot/skills/commit/e582b618a45263a11a7550d798b9e76cb0440152). GitHub is a trusted external source. This reference itself is informational and does not pose a direct security risk.
================================================================================
- AI detected serious security threats