call-chain
Warn
Audited by Gen Agent Trust Hub on May 9, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses a
findcommand to discover the path of a script namedgraph_query.pyin the~/.claude/pluginsdirectory and then executes it usingpython3. This runtime determination of an executable's path is a dynamic execution pattern. - [PROMPT_INJECTION]: The skill's fallback logic interpolates user-provided function names into shell commands (
rgorgrep) without sanitization. This creates an indirect prompt injection surface for command injection. 1. Ingestion points: Function names or entry points from user input inSKILL.md. 2. Boundary markers: None present. 3. Capability inventory: Execution ofrgandgrepshell commands inSKILL.md. 4. Sanitization: No input validation or escaping of the user-provided function name before shell interpolation.
Audit Metadata