claude-commands
Audited by Socket on Feb 16, 2026
1 alert found:
Security[Skill Scanner] Backtick command substitution detected All findings: [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] [HIGH] command_injection: Backtick command substitution detected (CI003) [AITech 9.1.4] BENIGN: The material is a design/specification document for authoring Claude Commands. It is internally consistent with its stated purpose and does not itself perform data collection, credential handling, or external network interactions. If adopted as a runtime artifact, security would then depend on the actual command implementations and the correctness of frontmatter validations and tool restrictions. LLM verification: The SKILL.md is not itself malicious, but it documents powerful features (file reads, shell execution, and broad tool permissions) that — if enabled or misused — can lead to sensitive data exposure, command injection, or repository/system modification. The primary security risk arises from over-broad allowed-tools entries and unsanitized interpolation of user inputs into shell execution contexts. Recommend treating contributed command files with caution, enforcing least-privilege tool grants, an