run-full-release
Fail
Audited by Gen Agent Trust Hub on Apr 4, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONCREDENTIALS_UNSAFEPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The
references/scaffolding-and-recovery.mdfile contains a script that searches for and modifies thegit.jsfile within the@semantic-release/gitpackage in global system paths such as/opt/homebrew/lib/node_modulesand the global npm root. This involves usingsed -ito patch external software files.\n- [REMOTE_CODE_EXECUTION]: The skill provides instructions inreferences/scaffolding-and-recovery.mdto install themisetool by fetching and executing an installation script from its official domain (curl https://mise.run | sh).\n- [CREDENTIALS_UNSAFE]: The skill instructs the user to store sensitive tokens (PyPI, Crates.io) in the~/.claude/.secrets/directory and provides configuration templates to read from this path. It also includes an audit step that greps for credential patterns likeGH_TOKENorNPM_TOKENin configuration files.\n- [PROMPT_INJECTION]: TheSKILL.mdfile includes a 'Post-Execution Reflection' section that directs the agent to locate its own source files and edit them based on execution outcomes. Additionally, the scaffolding logic reads untrusted repository configuration files to generate new task code without sanitization or boundary markers.\n- [EXTERNAL_DOWNLOADS]: The skill performs network requests topypi.organdcrates.ioto verify package publication status.
Recommendations
- AI detected serious security threats
Audit Metadata