peon-ping-config
Pass
Audited by Gen Agent Trust Hub on Feb 27, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill instructs the agent to execute a local bash script located at
${CLAUDE_CONFIG_DIR:-$HOME/.claude}/hooks/peon-ping/peon.shfor the purpose of listing available sound packs. This script is a vendor-provided resource associated with the author 'peonping'. - [PROMPT_INJECTION]: The skill demonstrates an attack surface for indirect prompt injection (Category 8) through its handling of the local configuration file.
- Ingestion points: The agent reads
${CLAUDE_CONFIG_DIR:-$HOME/.claude}/hooks/peon-ping/config.jsonto facilitate user-requested updates. - Boundary markers: No explicit delimiters or instructions are provided to the agent to ignore potentially malicious instructions embedded within the JSON values during the read/edit process.
- Capability inventory: The agent has the ability to execute shell commands (specifically the vendor's
peon.sh) and perform file-write operations on the configuration file. - Sanitization: There is no evidence of schema validation or sanitization for the values stored in
config.jsonbefore they are processed by the agent.
Audit Metadata