diagnostic-issue-resolver
Warn
Audited by Gen Agent Trust Hub on Apr 4, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION]: The skill includes a 'Post-Execution Reflection' section that instructs the agent to autonomously modify its own 'SKILL.md' file. This self-modification mechanism allows the agent to change its instructions based on usage, which could be exploited to persist malicious instructions if the agent is compromised during a session.
- [DATA_EXFILTRATION]: Indirect Prompt Injection Surface. The skill reads external data that could be influenced by untrusted users, specifically Telegram bot logs and audit logs.
- Ingestion points: Reads log files using
tailandgrepinSKILL.mdandreferences/common-issues.md. - Boundary markers: None identified. Instructions do not warn against following commands found in logs.
- Capability inventory: The skill has access to
Bashand can execute system commands likepkill,rm, and run local scripts or binaries (bun,python). - Sanitization: No sanitization or escaping is performed on the log content before processing.
- [COMMAND_EXECUTION]: The skill heavily relies on the
Bashtool to perform system diagnostics, process management (pgrep,pkill), and execution of local maintenance scripts (kokoro-install.sh). While aligned with the troubleshooting purpose, it provides a broad surface for command execution. - [DATA_EXPOSURE]: The skill accesses several sensitive local paths, including bot source code, environment configurations (
mise.toml), and detailed audit logs in~/.claude/automation/and~/.local/. This exposes internal system details and potentially user data to the agent context.
Audit Metadata