dig
Pass
Audited by Gen Agent Trust Hub on Mar 14, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION]: Potential for indirect prompt injection. The skill extracts and displays summaries and messages from past Claude Code sessions. If a past session contains malicious instructions, the agent processing the output of this skill might inadvertently follow them.
- Ingestion points:
scripts/dig.pyreads session history from.jsonlfiles in~/.claude/projects/. - Boundary markers: The rendering instructions in
SKILL.mddo not include delimiters or warnings to ignore embedded instructions. - Capability inventory: The skill performs read-only operations using
lsandpython3. - Sanitization: The script truncates session summaries and message snippets to 80 characters.
- [COMMAND_EXECUTION]: The skill executes the
lscommand to discover project directories and theghq list -pcommand within the Python script to resolve repository paths. - [DATA_EXFILTRATION]: The skill accesses sensitive interaction logs in
~/.claude/projects/, which contain private conversation history and metadata from past sessions.
Audit Metadata