cook-hard
Pass
Audited by Gen Agent Trust Hub on Apr 29, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION]: Indirect Prompt Injection Surface. The skill ingests untrusted data through the
$ARGUMENTSparameter and reads various project files (e.g., files indocs/and source code) during its research and planning phases without sufficient boundary markers or sanitization. - Ingestion points:
$ARGUMENTSinSKILL.mdand read operations on local workspace files. - Boundary markers: Absent. The skill does not provide clear delimiters or instructions for the agent to ignore potentially malicious instructions embedded within the data it processes.
- Capability inventory: The skill uses
TaskCreate,grep,glob, and executes local Python scripts (.claude/scripts/code_graph). - Sanitization: Absent. There is no evidence of filtering or validation for the inputs used in task creation or script arguments.
- [COMMAND_EXECUTION]: Local Script Execution. The workflow requires the agent to execute a local Python script (
.claude/scripts/code_graph) with various arguments (trace,connections,callers_of). While the script is part of the project repository, its execution is driven by parameters derived from the agent's analysis of the codebase, which can be influenced by external input.
Audit Metadata