claude-review
Warn
Audited by Gen Agent Trust Hub on Mar 25, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill interpolates user-controlled input from the
focusparameter directly into shell commands. If a user provides malicious input that includes shell metacharacters (e.g., semicolons, backticks), they can execute arbitrary commands on the host system. - Evidence: The commands in
SKILL.md(Step 1 and Step 4) use${FOCUS}inside double-quoted strings within abashcontext. - [PROMPT_INJECTION]: The skill processes untrusted project data and passes it to an external LLM (Claude) without sufficient protection against adversarial instructions embedded in the code.
- Ingestion points:
git diff,git show, andgit ls-filesinSKILL.mdingest the current project's codebase. - Boundary markers: Absent; the code changes are piped directly into the
claudeprompt without clear delimiters or 'ignore' instructions. - Capability inventory: The skill utilizes
Bash,Write,Edit, andReadtools, which could be abused if the agent follows instructions found within the reviewed code. - Sanitization: Absent; the skill performs no escaping or validation of the code content before passing it to the CLI tool.
Audit Metadata