code-review
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- PROMPT_INJECTION (HIGH): The 'config-manager' sub-skill performs automatic discovery of review skills by scanning the entire workspace using the pattern
**/SKILL.md. It reads and extracts the 'name' and 'description' fields from any matching file. This data is then stored in a configuration file and used inexecutor/scripts/launch-subagents.shto generate prompts for theTasktool. Because the skill names are interpolated into these prompts without sanitization or escaping, an attacker can place a maliciousSKILL.mdfile in the repository (e.g., in a node_modules or temp directory) containing quote characters to break the prompt string and inject arbitrary subagent instructions or parameters. - COMMAND_EXECUTION (MEDIUM): Multiple scripts (
merge-configs.sh,validate-config.sh) depend on the external binaryyq. Whileyqis a common utility, it is an unverifiable system dependency. Furthermore,merge-configs.shperforms complexyq evaloperations on content aggregated from multiple configuration files, including those populated by the insecure workspace discovery process, which could lead to unexpected behavior or exploitation of theyqevaluator. - DATA_EXFILTRATION (LOW): The skill reads from and writes to sensitive user-level directories including
~/.claudeand~/.config. While this is intended for configuration persistence, the broad workspace scanning (**/SKILL.md) means the agent may inadvertently process and store metadata from unrelated or sensitive project subdirectories.
Recommendations
- AI detected serious security threats
Audit Metadata