project-setup
Warn
Audited by Gen Agent Trust Hub on Mar 9, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Grants execution permissions using
chmod +xto shell scripts installed to the.claude/hooks/directory to enable their use as agent hooks. - [COMMAND_EXECUTION]: Configures automated command execution in
.claude/settings.json, linking the installed shell scripts to agent events such asPreToolUse,PostToolUse, andStop. - [EXTERNAL_DOWNLOADS]: Locates and copies scripts and configuration files from the
sd0x-dev-flowplugin directory (identified in~/.claude/plugins/ornode_modules/) into the project environment, introducing external logic into the local repository. - [PROMPT_INJECTION]: Vulnerable to indirect prompt injection during the project detection and configuration phase.
- Ingestion points: Manifest files such as
package.json,pyproject.toml, andCargo.toml(analyzed in Phase 1). - Boundary markers: Absent; the skill performs direct string replacement of placeholders in the
CLAUDE.mdtemplate. - Capability inventory: The skill has access to
Bash,Write, andEdittools to modify project behavior. - Sanitization: No validation or escaping is applied to values extracted from external project manifests before they are integrated into the persistent
CLAUDE.mdconfiguration file.
Audit Metadata