telegram-usage
Pass
Audited by Gen Agent Trust Hub on Feb 26, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses
execSyncinhandler.jsto execute the localclawdbot models statuscommand. This is a legitimate functional requirement for retrieving quota information but represents a use of system-level command execution.- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection via the processing of untrusted session data. - Ingestion points: The script
session-reader.jsreads session metadata fromsessions.jsonand conversation transcripts from.jsonlfiles in the user's home directory. - Boundary markers: No delimiters or instructions are used to separate user-provided content from the skill's logic when reading transcripts.
- Capability inventory: The skill possesses the ability to read and write to the file system and execute local shell commands.
- Sanitization: The
formatStatsfunction insession-reader.jsinterpolates data likestats.modelandstats.providerdirectly into an HTML-formatted string for Telegram without escaping. This allows potentially malicious content within a session's metadata to manipulate the output display.
Audit Metadata