skill-development
Audited by Gen Agent Trust Hub on Feb 12, 2026
================================================================================
✅ VERDICT: SAFE
The analyzed files constitute documentation and examples for creating skills within the Claude Code plugin ecosystem. They describe the architecture, best practices, and advanced features of skill development. While the skill system inherently supports command execution, the documentation presents this feature with benign, local examples and includes explicit security considerations.
Total Findings: 0
================================================================================
Detailed Analysis:
1. SKILL.md:
- Prompt Injection: No patterns detected. The description and content are instructional.
- Data Exfiltration: No patterns detected. The
[BANG]command examples (git status --short,git log --oneline -5) are benign local commands. The documentation includes a security note: 'Commands execute in the user's environment. Only use trusted commands.' - Command Execution: The document explicitly details features that involve command execution, such as
[BANG]syntax for dynamic context injection andhookswithtype: command(e.g.,"${CLAUDE_PLUGIN_ROOT}/scripts/validate-write.sh"). These are core features of the skill system, explained with benign, local script examples. The documentation also highlightsallowed-toolsanddisable-model-invocationas security features. - Obfuscation: No obfuscation detected.
- Other Threats: No other threats (Privilege Escalation, Persistence, Metadata Poisoning, Time-Delayed) were detected.
2. examples/complete-skill.md:
- Prompt Injection: No patterns detected.
- Data Exfiltration: The example scripts (
rest-api-tests.sh,graphql-tests.sh) usecurlto interact withBASE_URLwhich defaults tohttp://localhost:3000or is set viaAPI_URLenvironment variable. Credentials are handled viaTEST_TOKENenvironment variable orprocess.env.JWT_SECRET/process.env.TEST_API_KEY. These are safe practices for examples and do not hardcode malicious endpoints or exfiltrate sensitive local files. - Command Execution: The
.shscripts are executable and demonstratecurlusage. Thegenerate-test.shscript generates a JavaScript test file usingcat > "$OUTPUT_FILE". All commands are benign within the context of API testing examples. - Unverifiable Dependencies: The generated JavaScript code
requiressupertestandjsonwebtoken. These are common libraries, but the skill itself does not executenpm installor similar commands. This is an example of code that would use these dependencies, not an instruction to install them. - Other Threats: No other threats detected.
3. examples/frontmatter-templates.md:
- Prompt Injection: No patterns detected. This file provides templates and best practices for frontmatter.
- Security Features: Examples for
allowed-tools(e.g.,Read, Grep, Glob, TaskandRead, Grep, AskUserQuestion) are presented as security-conscious configurations. - Other Threats: No threats detected.
4. examples/minimal-skill.md:
- Prompt Injection: No patterns detected.
- Other Threats: No threats detected. This is a purely markdown-based example skill.
5. references/advanced-frontmatter.md:
- Prompt Injection: No patterns detected.
- Command Execution: The
hookssection explicitly showscommandhooks executing local scripts (e.g.,"${CLAUDE_PLUGIN_ROOT}/scripts/validate-write.sh"). TheVisual Output Generatorssection also describes executing local scripts (e.g.,python ${CLAUDE_PLUGIN_ROOT}/skills/visualization-skill/scripts/generate-chart.py). These are features of the skill system, explained with benign, local script examples for validation and output generation. - Security Features: The document details
Skill Permission Syntaxfor fine-grained control over skill invocation, reinforcing security. - Other Threats: No other threats detected.
6. references/commands-vs-skills.md:
- Prompt Injection: No patterns detected.
- Command Execution: Mentions
[BANG]bash execution as a shared mechanism between commands and skills. This is informational. - Other Threats: No threats detected.
7. references/skill-creation-workflow.md:
- Prompt Injection: No patterns detected.
- Command Execution: Shows benign shell commands for creating directory structures (
mkdir -p,touch). - Other Threats: No threats detected.
8. references/skill-creator-original.md:
- Prompt Injection: No patterns detected.
- Command Execution: Mentions local Python scripts (
scripts/init_skill.py,scripts/package_skill.py,scripts/rotate_pdf.py) as part of the skill creation and management process. These are system-provided tools, not malicious. - Other Threats: No threats detected.
Conclusion:
The analyzed files are instructional and exemplary in nature. They accurately describe the capabilities of the Claude Code skill system, including its ability to execute local commands and scripts. The examples provided are safe, local, and do not contain any malicious patterns. The documentation also actively promotes secure practices and highlights security-related features of the skill system. Therefore, the documentation itself is deemed SAFE.