agent-coder
Warn
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The pre-hook script executes a shell command
echo "💻 Coder agent implementing: $TASK". This allows for arbitrary command execution if the$TASKenvironment variable contains shell metacharacters such as backticks or command substitution syntax. - [COMMAND_EXECUTION]: The post-hook script runs
npm run lint --if-present. This executes scripts defined in the project'spackage.jsonfile, which could be malicious if the agent is working on an untrusted repository. - [PROMPT_INJECTION]: The skill's use of the
$TASKvariable to influence hook logic creates an indirect prompt injection surface. Evidence: 1. Ingestion points: The$TASKenvironment variable in theprehook. 2. Boundary markers: Absent. 3. Capability inventory: Host shell execution viaecho,grep, andnpm. 4. Sanitization: None identified for the$TASKinput.
Audit Metadata