fleet-auditor
Pass
Audited by Gen Agent Trust Hub on May 4, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/fleet.pyutilizessubprocess.runto invoke system utilities (open,xdg-open, orstart) to display a locally generated HTML dashboard in the user's default web browser. The command execution is limited to opening a file path defined within the application's local directory. - [PROMPT_INJECTION]: The skill processes untrusted data in the form of agent session logs and project transcripts from directories like
~/.claude/projects/and~/.openclaw/. Malicious instructions within these external logs could potentially influence the agent when it parses and summarizes audit results. - Ingestion points:
scripts/fleet.pyandscripts/shared.py(reading from various agent platform data paths) - Boundary markers: Not explicitly defined in the
SKILL.mdinstructions when reporting findings to the user - Capability inventory: File system read/write access and local command execution via
subprocess.run - Sanitization: The dashboard generation logic uses
html.escapeto sanitize data before inclusion in the HTML report.
Audit Metadata