session-control

Pass

Audited by Gen Agent Trust Hub on Mar 21, 2026

Risk Level: SAFEPROMPT_INJECTION
Full Analysis
  • [PROMPT_INJECTION]: The skill presents a potential surface for indirect prompt injection via the interpolation of external workflow variables into shell commands.
  • Ingestion points: Workflow variables such as fork_reason and resume_session_id are ingested and used as arguments for the ./scripts/session-control.sh command.
  • Boundary markers: The skill does not specify any boundary markers or instructions to isolate potentially untrusted input within these variables.
  • Capability inventory: The skill is configured with Bash, Read, Write, and Edit tool access, which allows it to modify the filesystem and execute system commands.
  • Sanitization: No logic for sanitizing or escaping the content of input variables is described prior to their execution in the bash environment.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 21, 2026, 01:19 PM