claude-code-clawdbot

Pass

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • COMMAND_EXECUTION (SAFE): The script executes local binaries (claude, script, tmux) to facilitate its primary function. It uses shlex.quote to sanitize inputs before passing them to the shell via script -c. This prevents shell injection vulnerabilities when constructing the command line for the pseudo-terminal wrapper.
  • PROMPT_INJECTION (LOW): The skill functions as a passthrough for user-provided prompts to the claude CLI, creating a surface for indirect prompt injection (Category 8). While the wrapper itself is secure, the downstream agent will process any instructions contained in the input.
  • Ingestion points: The args.prompt variable in scripts/claude_code_run.py receives untrusted input from the user.
  • Boundary markers: No boundary markers or 'ignore embedded instructions' warnings are added to the prompt before it is passed to the Claude CLI.
  • Capability inventory: The claude CLI is a high-capability tool capable of file modification and command execution on the host.
  • Sanitization: The script uses shlex.quote for shell safety, but does not perform content-based sanitization of the prompt itself.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 17, 2026, 06:41 PM