skill-development

Pass

Audited by Gen Agent Trust Hub on Feb 12, 2026

Risk Level: LOWCOMMAND_EXECUTION
Full Analysis

================================================================================

✅ VERDICT: SAFE

The analyzed files constitute documentation and examples for creating skills within the Claude Code plugin ecosystem. They describe the architecture, best practices, and advanced features of skill development. While the skill system inherently supports command execution, the documentation presents this feature with benign, local examples and includes explicit security considerations.

Total Findings: 0

================================================================================

Detailed Analysis:

1. SKILL.md:

  • Prompt Injection: No patterns detected. The description and content are instructional.
  • Data Exfiltration: No patterns detected. The [BANG] command examples (git status --short, git log --oneline -5) are benign local commands. The documentation includes a security note: 'Commands execute in the user's environment. Only use trusted commands.'
  • Command Execution: The document explicitly details features that involve command execution, such as [BANG] syntax for dynamic context injection and hooks with type: command (e.g., "${CLAUDE_PLUGIN_ROOT}/scripts/validate-write.sh"). These are core features of the skill system, explained with benign, local script examples. The documentation also highlights allowed-tools and disable-model-invocation as security features.
  • Obfuscation: No obfuscation detected.
  • Other Threats: No other threats (Privilege Escalation, Persistence, Metadata Poisoning, Time-Delayed) were detected.

2. examples/complete-skill.md:

  • Prompt Injection: No patterns detected.
  • Data Exfiltration: The example scripts (rest-api-tests.sh, graphql-tests.sh) use curl to interact with BASE_URL which defaults to http://localhost:3000 or is set via API_URL environment variable. Credentials are handled via TEST_TOKEN environment variable or process.env.JWT_SECRET/process.env.TEST_API_KEY. These are safe practices for examples and do not hardcode malicious endpoints or exfiltrate sensitive local files.
  • Command Execution: The .sh scripts are executable and demonstrate curl usage. The generate-test.sh script generates a JavaScript test file using cat > "$OUTPUT_FILE". All commands are benign within the context of API testing examples.
  • Unverifiable Dependencies: The generated JavaScript code requires supertest and jsonwebtoken. These are common libraries, but the skill itself does not execute npm install or similar commands. This is an example of code that would use these dependencies, not an instruction to install them.
  • Other Threats: No other threats detected.

3. examples/frontmatter-templates.md:

  • Prompt Injection: No patterns detected. This file provides templates and best practices for frontmatter.
  • Security Features: Examples for allowed-tools (e.g., Read, Grep, Glob, Task and Read, Grep, AskUserQuestion) are presented as security-conscious configurations.
  • Other Threats: No threats detected.

4. examples/minimal-skill.md:

  • Prompt Injection: No patterns detected.
  • Other Threats: No threats detected. This is a purely markdown-based example skill.

5. references/advanced-frontmatter.md:

  • Prompt Injection: No patterns detected.
  • Command Execution: The hooks section explicitly shows command hooks executing local scripts (e.g., "${CLAUDE_PLUGIN_ROOT}/scripts/validate-write.sh"). The Visual Output Generators section also describes executing local scripts (e.g., python ${CLAUDE_PLUGIN_ROOT}/skills/visualization-skill/scripts/generate-chart.py). These are features of the skill system, explained with benign, local script examples for validation and output generation.
  • Security Features: The document details Skill Permission Syntax for fine-grained control over skill invocation, reinforcing security.
  • Other Threats: No other threats detected.

6. references/commands-vs-skills.md:

  • Prompt Injection: No patterns detected.
  • Command Execution: Mentions [BANG] bash execution as a shared mechanism between commands and skills. This is informational.
  • Other Threats: No threats detected.

7. references/skill-creation-workflow.md:

  • Prompt Injection: No patterns detected.
  • Command Execution: Shows benign shell commands for creating directory structures (mkdir -p, touch).
  • Other Threats: No threats detected.

8. references/skill-creator-original.md:

  • Prompt Injection: No patterns detected.
  • Command Execution: Mentions local Python scripts (scripts/init_skill.py, scripts/package_skill.py, scripts/rotate_pdf.py) as part of the skill creation and management process. These are system-provided tools, not malicious.
  • Other Threats: No threats detected.

Conclusion:

The analyzed files are instructional and exemplary in nature. They accurately describe the capabilities of the Claude Code skill system, including its ability to execute local commands and scripts. The examples provided are safe, local, and do not contain any malicious patterns. The documentation also actively promotes secure practices and highlights security-related features of the skill system. Therefore, the documentation itself is deemed SAFE.

Audit Metadata
Risk Level
LOW
Analyzed
Feb 12, 2026, 02:32 PM