session-analyzer
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATIONREMOTE_CODE_EXECUTION
Full Analysis
- COMMAND_EXECUTION (HIGH): The skill interpolates user-provided parameters directly into shell commands. In
SKILL.md(Step 1.1 and 3.1), the parameters{sessionId},{agent-name}, and{debug-log-path}are passed to scripts likefind-session-files.sh. If a user provides a malicious session ID (e.g.,; rm -rf / ;), it could lead to arbitrary command execution. - DATA_EXFILTRATION (HIGH): The skill is designed to read highly sensitive data from
~/.claude/, including session logs (.jsonl), debug traces (.txt), and agent transcripts. These files contain the full history of a user's interactions with the AI, including potentially sensitive code, environment details, and private prompts. Accessing these paths constitutes a high-risk data exposure. - REMOTE_CODE_EXECUTION (HIGH): The skill relies on external shell scripts located in
${baseDir}/scripts/. Since these scripts are not provided in the skill definition and are executed with user-supplied arguments, they represent a significant RCE vector if the environment is not strictly controlled or if the scripts themselves have vulnerabilities. - PROMPT_INJECTION (MEDIUM): In Category 8 (Indirect Prompt Injection), the skill parses external
SKILL.mdfiles and session logs to build a 'Comparison Table'. A maliciously craftedSKILL.mdor a poisoned session log could contain instructions that influence the analysis logic or produce deceptive reports, potentially hiding malicious activity from the user.
Recommendations
- AI detected serious security threats
Audit Metadata