claude-health
Pass
Audited by Gen Agent Trust Hub on Apr 20, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Employs shell utilities like
find,ls,du, andgit hash-objectto perform integrity audits on the.claude/configuration directory and installed plugins. - [COMMAND_EXECUTION]: Includes the capability to delete identified junk files and temporary archives using the
rmcommand during automated or guided fix operations. - [PROMPT_INJECTION]: The skill presents a surface for indirect prompt injection due to its handling of external project data.
- Ingestion points: Reads content from configuration files such as
.claude/.gitignore,settings.json,settings.local.json, andSKILL.mdmanifests within skill subdirectories. - Boundary markers: Does not employ explicit delimiters or system instructions to ignore potential commands embedded within the analyzed configuration files.
- Capability inventory: Accesses tools for file deletion (
rm), git repository manipulation, and project-wide file reading. - Sanitization: No evidence of input validation or sanitization is present for data ingested from the project files before it is processed or reported.
Audit Metadata