errors
Pass
Audited by Gen Agent Trust Hub on Feb 25, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Uses the Bash tool to execute local Python and shell scripts for error collection and analysis. Specifically, it references scripts and hooks within the .claude directory to process session logs.\n- [PROMPT_INJECTION]: The skill processes raw tool outputs stored in .claude/logs/errors.jsonl. This ingestion of potentially untrusted data from external tool responses creates a surface for indirect prompt injection.\n
- Ingestion points: .claude/logs/errors.jsonl containing raw tool responses.\n
- Boundary markers: None identified in the skill manifest.\n
- Capability inventory: Bash, Read, and Python execution capabilities.\n
- Sanitization: Sanitization logic is delegated to the referenced Python scripts and is not explicitly defined in the markdown.
Audit Metadata