sdk-config-validator
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHDATA_EXFILTRATIONPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- Data Exposure & Exfiltration (HIGH): The skill accesses and extracts sensitive credentials from the local file system.
- Evidence:
scripts/validate-env-setup.shextracts the value ofANTHROPIC_API_KEYfrom the project's.envfile usinggrepandcutfor validation purposes, exposing the secret to the agent context. - Indirect Prompt Injection (HIGH): The skill processes untrusted project files and has write/execute capabilities via the Bash tool and suggested workflow.
- Ingestion points: Reads
.env,package.json,pyproject.toml,requirements.txt,main.py, andtsconfig.json(potentially attacker-controlled configuration files). - Boundary markers: Absent; no delimiters or explicit instructions to ignore embedded commands are used when reading files.
- Capability inventory: The skill uses the
Bashtool to execute scripts and its manifest encourages the agent to 'Apply Fixes', enabling file modifications based on the processed untrusted data. - Sanitization: Absent; content from the project files is processed and output to the agent's context without sanitization or validation.
- Unverifiable Dependencies & Remote Code Execution (MEDIUM): The skill suggests installing external packages that are not verified against the trusted source list.
- Node packages:
@claude-ai/sdk. - Python packages:
claude-ai-sdk,python-dotenv,pydantic,pytest,pytest-asyncio,black,ruff,mypy. - Command Execution (LOW): The skill executes local shell commands to verify system state and package presence.
- Evidence:
scripts/check-sdk-version.shandscripts/validate-python.shexecutepython3 -cusing static strings to check versions.
Recommendations
- AI detected serious security threats
Audit Metadata