glossary-management
Pass
Audited by Gen Agent Trust Hub on Feb 28, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes local TypeScript scripts using the Bun runtime, specifically
~/.claude/tools/bin/glossary-sync.tsand~/eon/cc-skills/plugins/itp-hooks/hooks/posttooluse-terminology-sync.ts. These scripts are used to synchronize terminology and are part of the intended local developer environment setup. - [COMMAND_EXECUTION]: Uses standard Unix utilities including
grepfor format validation,findfor file discovery, andrmfor cleaning up stale directory structures. - [INDIRECT_PROMPT_INJECTION]: The skill processes content from various
CLAUDE.mdfiles and a centralGLOSSARY.mdfile. This ingestion of external data constitutes a potential attack surface if project files contain malicious content designed to exploit the sync scripts. - Ingestion points: Files located via
SCAN_PATHS(e.g.,~/eon/*/CLAUDE.md) and the central~/.claude/docs/GLOSSARY.mdfile. - Boundary markers: The skill enforces a strict 5-column markdown table schema and utilizes specific HTML comments (
<!-- SCAN_PATHS: ... -->) for configuration. - Capability inventory: The skill has permissions for
Bashexecution,Read/Editfile access, andGrepsearch operations. - Sanitization: Validation is performed through regular expression checks (via
grep) and structured parsing within the local TypeScript hooks.
Audit Metadata