errors

Pass

Audited by Gen Agent Trust Hub on Feb 25, 2026

Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: Uses the Bash tool to execute local Python and shell scripts for error collection and analysis. Specifically, it references scripts and hooks within the .claude directory to process session logs.\n- [PROMPT_INJECTION]: The skill processes raw tool outputs stored in .claude/logs/errors.jsonl. This ingestion of potentially untrusted data from external tool responses creates a surface for indirect prompt injection.\n
  • Ingestion points: .claude/logs/errors.jsonl containing raw tool responses.\n
  • Boundary markers: None identified in the skill manifest.\n
  • Capability inventory: Bash, Read, and Python execution capabilities.\n
  • Sanitization: Sanitization logic is delegated to the referenced Python scripts and is not explicitly defined in the markdown.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 25, 2026, 03:10 PM