peon-ping-config

Pass

Audited by Gen Agent Trust Hub on Feb 27, 2026

Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill instructs the agent to execute a local bash script located at ${CLAUDE_CONFIG_DIR:-$HOME/.claude}/hooks/peon-ping/peon.sh for the purpose of listing available sound packs. This script is a vendor-provided resource associated with the author 'peonping'.
  • [PROMPT_INJECTION]: The skill demonstrates an attack surface for indirect prompt injection (Category 8) through its handling of the local configuration file.
  • Ingestion points: The agent reads ${CLAUDE_CONFIG_DIR:-$HOME/.claude}/hooks/peon-ping/config.json to facilitate user-requested updates.
  • Boundary markers: No explicit delimiters or instructions are provided to the agent to ignore potentially malicious instructions embedded within the JSON values during the read/edit process.
  • Capability inventory: The agent has the ability to execute shell commands (specifically the vendor's peon.sh) and perform file-write operations on the configuration file.
  • Sanitization: There is no evidence of schema validation or sanitization for the values stored in config.json before they are processed by the agent.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 27, 2026, 01:11 AM