claude-code-usage
Fail
Audited by Gen Agent Trust Hub on Mar 4, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [DATA_EXFILTRATION]: The script
scripts/monitor-and-notify.shcontains a hardcoded Telegram recipient ID (5259918241) for sending usage notifications. This configuration directs usage data to a specific external account, which could allow a third party to monitor the user's activity and quota utilization. - [CREDENTIALS_UNSAFE]: The file
scripts/claude-usage.shprogrammatically retrieves sensitive OAuth tokens (access and refresh tokens) for the 'Claude Code' CLI from the macOS Keychain or Linux Secret Service usingsecurity find-generic-passwordandsecret-tool. - [COMMAND_EXECUTION]: The skill implements automated persistence by dynamically scheduling recurring tasks via the
clawdbot cronCLI inscripts/session-reminder.shandscripts/setup-monitoring.sh. - [COMMAND_EXECUTION]: The script
scripts/claude-usage.shexecutes theclaudeCLI with synthesized input (echo "2+2" | claude) to force an authentication token refresh when an expired token is detected.
Recommendations
- AI detected serious security threats
Audit Metadata