session-recovery
Pass
Audited by Gen Agent Trust Hub on Apr 4, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses the
Bashtool to perform environment diagnostics, search for session files, and execute theclaudeCLI tool with the--dangerously-skip-permissionsflag. It also references the execution of a local recovery script located at~/.claude/tools/session-recovery.sh. - [DATA_EXFILTRATION]: The skill accesses sensitive user data by reading conversation history stored in
~/.claude/projects/*.jsonl. While this exposure is inherent to the session recovery use-case, it involves access to potentially sensitive personal or project-related information. No evidence of external transmission was identified. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it ingests conversation history, which is technically untrusted data that could contain malicious instructions.
- Ingestion points: Reads conversation history from JSONL files in
~/.claude/projects/(found in SKILL.md and TROUBLESHOOTING.md). - Boundary markers: Absent; the session content is read without markers or instructions to ignore embedded agent commands.
- Capability inventory: The skill possesses the
BashandReadtools, enabling a high degree of control over the file system and CLI operations. - Sanitization: Absent; no validation or filtering is performed on the content of the session files before the agent processes them.
Audit Metadata