agent-sona-learning-optimizer
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- Remote Code Execution (MEDIUM): The skill uses
npx claude-flow@alphain its hooks.npxdownloads and executes code from the npm registry at runtime. The packageclaude-flowis not from a trusted organization, and the@alphatag suggests unverified/unstable code. - Command Execution (MEDIUM): The hooks demonstrate shell commands that interpolate variables like
$TASKand$ID. If these variables contain unsanitized input from a user or external source, it could lead to arbitrary command execution on the host system. - External Downloads (MEDIUM): References the external package
@ruvector$sona@0.1.1andclaude-flow@alpha, neither of which originate from the defined list of trusted sources. - Indirect Prompt Injection (LOW):
- Ingestion points: The
$TASKvariable in thepre-taskhook is an entry point for untrusted data. - Boundary markers: Absent. The variable is interpolated directly into a shell command without delimiters.
- Capability inventory: Shell execution via
npxand network access for package fetching. - Sanitization: Absent. No escaping or validation of the
$TASKinput is performed before execution.
Audit Metadata