planning-with-files
Pass
Audited by Gen Agent Trust Hub on Mar 11, 2026
Risk Level: SAFEPROMPT_INJECTIONDATA_EXFILTRATIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: Indirect prompt injection surface via persistent file reading. The skill implements a
PreToolUsehook that automatically reads the first 30 lines oftask_plan.mdbefore every tool call. This creates a feedback loop where untrusted content written to the plan (e.g., from web search results) is repeatedly re-injected into the agent's context. Ingestion point:task_plan.mdvia hook. Boundary markers: Absent in hook command. Capability inventory:Bash,Write,Edit. Sanitization: Documentation-based warnings only. - [DATA_EXFILTRATION]: Local session data exposure. The
session-catchup.pyscript is designed to locate and read JSONL session logs stored in~/.claude/projects/. This exposes historical conversation data and tool outputs from previous sessions to the current agent context for state recovery. - [COMMAND_EXECUTION]: Local script execution. The skill executes Shell and PowerShell scripts for initialization and status monitoring. The
Stophook runscheck-complete.ps1with the-ExecutionPolicy Bypassflag to ensure execution on Windows systems. Additionally,SKILL.mdprovides instructions for runningsession-catchup.pyvia the local Python interpreter.
Audit Metadata