claude-code-optimizer
Pass
Audited by Gen Agent Trust Hub on Mar 17, 2026
Risk Level: SAFEDATA_EXFILTRATIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [DATA_EXPOSURE]: The skill is designed to audit sensitive configuration files including
~/.claude/settings.jsonand project-level memory files (CLAUDE.md). These locations may contain environment variables, path configurations, or tool permissions. - [COMMAND_EXECUTION]: The skill utilizes high-privilege tools such as
Bash,Write, andTaskto perform audits and coordinate sub-agents likeaudit-orchestratorandpermissions-auditor. - [EXTERNAL_DOWNLOADS]: The metadata installation command fetches the skill definition from a public GitHub repository via
curl(raw.githubusercontent.com/vbonk/claude-code-optimizer/main/SKILL.md). This is documented as a reference to a well-known service. - [PROMPT_INJECTION]: The skill has a surface for indirect prompt injection (Category 8) because it ingests configuration data that may be controlled by third parties in shared repositories.
- Ingestion points: Reads
CLAUDE.md,.claude/settings.json, and other configuration files inSKILL.md. - Boundary markers: No specific delimiters or instructions are provided to distinguish between audited data and the agent's instructions.
- Capability inventory: The skill employs
Bash,Write, andTasktools as documented inSKILL.md. - Sanitization: There is no explicit logic for validating or sanitizing the content of the configuration files before processing.
Audit Metadata