skill-toggle
Pass
Audited by Gen Agent Trust Hub on Feb 24, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: Indirect Prompt Injection vulnerability surface. The skill reads and displays data from external files that could contain malicious instructions.
- Ingestion points: The
extract_frontmatterfunction inscripts/skill_toggle.pyreadsSKILL.mdfiles from other skill directories in~/.claude/skills/. - Boundary markers: Extracted skill metadata is displayed to the agent in a plain text table without protective delimiters or instructions to ignore embedded commands.
- Capability inventory: The skill uses the
Bashtool to execute a Python script that can move directories and modify the user's~/.claude/settings.jsonconfiguration file. - Sanitization: The script uses a strict alphanumeric regex to prevent path traversal via skill names, though it does not filter extracted descriptions for instructional content.
- [COMMAND_EXECUTION]: Local Script Execution. The skill uses the
Bashtool to execute its primary logic contained inscripts/skill_toggle.py, which performs filesystem operations and updates configuration files.
Audit Metadata