ops-next
Warn
Audited by Gen Agent Trust Hub on Apr 29, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Use of dynamic context injection to execute shell commands silently at runtime.
- Evidence: Multiple occurrences of the
!commandsyntax inSKILL.mdused to execute${CLAUDE_PLUGIN_ROOT}/bin/ops-infra,ops-prs,ops-ci, andops-unread. - Evidence: A shell loop in
SKILL.mdthat usesjqto parse${CLAUDE_PLUGIN_ROOT}/scripts/registry.jsonand thencatto read up to 30 lines of various.planning/STATE.mdfiles based on paths in the registry. - Risk: These commands execute automatically when the skill is loaded without user confirmation. While intended for data gathering, they represent unvetted shell execution that injects local file content into the agent's context.
- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection (Category 8).
- Ingestion points:
SKILL.mdreads data frompreferences.json,daemon-health.json,topics_active.md,registry.json, and multiple project-specificSTATE.mdfiles. - Boundary markers: Absent. External data is interpolated directly into the prompt context without delimiters or instructions to ignore embedded commands.
- Capability inventory: The skill has access to sensitive tools including
Bash,WebFetch,SendMessage,TaskCreate, and several Linear/Slack MCP tools. - Sanitization: Absent. No validation or escaping is performed on the content of the ingested files.
- Risk: If an attacker or a malicious process can modify the
STATE.mdfiles or other ingested configuration files, they can inject instructions that the agent may execute using its available tools.
Audit Metadata