trace
Warn
Audited by Gen Agent Trust Hub on Apr 13, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: User input from the
[query]argument is interpolated directly into shell commands within theSKILL.mdinstructions, such asfind,grep, andgit log. If the query contains shell metacharacters, it could lead to arbitrary command execution on the host system.\n- [DATA_EXFILTRATION]: Thescripts/dig.pyscript reads Claude Code session history from.jsonlfiles. These files contain full logs of previous interactions, which may include sensitive information or code. Accessing these files exposes private historical data to the agent's current context.\n- [EXTERNAL_DOWNLOADS]: The skill supports cloning external repositories usingghq getwhen a URL is provided to the--repoargument. This allows for the retrieval and local storage of external code from arbitrary sources.
Audit Metadata