authoring-agents
Pass
Audited by Gen Agent Trust Hub on Mar 6, 2026
Risk Level: SAFEDATA_EXFILTRATIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [DATA_EXFILTRATION]: The skill accesses sensitive configuration and rule files within the user's home directory, specifically targeting paths such as
$HOME/.claudeand$HOME/dotfiles/claude-code/rules/. This access is utilized to synchronize routing tables and agent settings with the local environment. - [COMMAND_EXECUTION]: The skill employs powerful tools including
Bash,Write, andEditto manage agent definitions. It is designed to create, modify, and delete files in theagents/directory and update configuration files to reflect changes in the agent roster. - [PROMPT_INJECTION]: The skill provides an indirect prompt injection surface through its scaffolding functionality. It ingests user-provided domain descriptions and metadata to populate agent templates, which could allow malicious instructions to be embedded in newly created agents.
- Ingestion points: Processes user-supplied strings for agent names, descriptions, and domain-specific logic in
INSTRUCTIONS.mdandAGENT-TEMPLATE.md. - Boundary markers: Uses Markdown code blocks and YAML frontmatter as structural delimiters for the generated agent files.
- Capability inventory: The skill has permissions to write to the filesystem and execute shell commands via the
Bashtool, allowing it to persist and potentially execute generated content. - Sanitization: No explicit sanitization or strict validation of the input strings is performed before they are interpolated into the system prompts of the generated agents.
Audit Metadata