skill-evolution
Fail
Audited by Gen Agent Trust Hub on Mar 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill performs shell execution of external scripts
evolution-engine.shandversion-manager.shlocated in the.claude/scripts/directory. These scripts manage the core logic of the skill, including reporting, analysis, and version restoration. - [EXTERNAL_DOWNLOADS]: The skill relies on unverifiable dependencies in the form of pre-existing shell scripts in the host environment's hidden project directory. These scripts are not part of the skill's own file distribution, making their behavior and safety impossible to verify within the skill context.
- [PROMPT_INJECTION]: The skill has a surface for indirect prompt injection by processing and learning from untrusted user edits.
- Ingestion points: Reads from
.claude/feedback/edit-patterns.jsonland.claude/feedback/evolution-registry.json. - Boundary markers: Absent; the skill does not use delimiters to distinguish between system instructions and learned user patterns during template modification.
- Capability inventory: Includes
Read,Write, andEdittools as documented inSKILL.mdand implemented via subcommands inevolution-commands.mdandversion-management.md. - Sanitization: Relies solely on regex-based pattern matching (documented in
pattern-detection-heuristics.md) without validation or escaping of the user-provided content before it is proposed for inclusion in skill templates.
Recommendations
- AI detected serious security threats
Audit Metadata