claude-config

Fail

Audited by Gen Agent Trust Hub on Feb 16, 2026

Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCREDENTIALS_UNSAFE
Full Analysis
  • [Data Exposure & Exfiltration] (HIGH): The skill documentation targets sensitive configuration and credential files. Evidence: SKILL.md identifies sensitive paths like '~/Library/Application Support/Claude/claude_desktop_config.json' and '.env'. EXAMPLES.md provides templates for managing sensitive 'POSTGRES_CONNECTION_STRING' and 'API_KEY' variables.
  • [Unverifiable Dependencies & Remote Code Execution] (HIGH): The skill promotes the execution of unverified remote code through package managers. Evidence: workflows.md and EXAMPLES.md recommend using 'npx -y', 'npm install -g', and 'uv run' for various servers without integrity checks. SKILL.md allow for 'extraKnownMarketplaces' to be defined via arbitrary Git URLs.
  • [Indirect Prompt Injection] (HIGH): The skill has a large attack surface for indirect injection via project-controlled data. Ingestion points: Reads configuration from '.claude/settings.json', '.claude-plugin/marketplace.json', and '.env'. Boundary markers: Absent. Capability inventory: High-privilege actions including writing to global application config files and executing shell commands via npm/uv/npx. Sanitization: Absent. Content from project files is directly used to configure the agent's execution environment.
  • [Privilege Escalation] (MEDIUM): Includes instructions to modify application-level security settings. Evidence: troubleshooting.md provides commands to enable Chrome DevTools by modifying 'developer_settings.json', potentially reducing the security posture of the host application.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 16, 2026, 05:44 AM