run-experiment
Warn
Audited by Gen Agent Trust Hub on Mar 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses the
Bashtool to perform environment checks, file synchronization viarsync, and process management. These commands are dynamically built using variables sourced from user input and configuration files. - [REMOTE_CODE_EXECUTION]: It facilitates the execution of Python scripts on local machines and remote servers via
ssh. The skill executes arbitrary scripts and arguments provided in the workflow without verification or sanitization. - [DATA_EXFILTRATION]: The skill reads configuration from
~/.claude/feishu.json, which likely contains webhooks or API credentials, to send notifications to an external service. If the notification data or destination is manipulated, it could result in data exposure. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection through the
CLAUDE.mdfile. - Ingestion points: Workflow Step 1 reads environment and server configuration from
CLAUDE.mdin the project directory. - Boundary markers: No markers or delimiters are used to separate untrusted configuration data from system instructions.
- Capability inventory: The skill has high-privilege access to
Bash(*),Read,Write, andEdittools. - Sanitization: No escaping or validation is performed on the data retrieved from
CLAUDE.mdbefore it is interpolated into shell commands.
Audit Metadata