reading-add
Warn
Audited by Gen Agent Trust Hub on Mar 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes several shell commands (
mkdir,cp,cat) to manage local files. It also dynamically resolves the path to a Python script (look_at.py) within a plugin cache directory (~/.claude/plugins/cache/edwinhu-plugins/...) and executes it usingpython3. This method of executing code from a dynamically computed path is a medium-risk pattern.\n- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection. Ingestion points:Sourceinput inSKILL.md(local file or URL). Boundary markers: Absent in the metadata extraction step. Capability inventory:cp,mkdir,python3(subprocess execution), andreadwiseCLI (network) inSKILL.md. Sanitization: Absent; untrusted content is processed directly for metadata extraction.\n- [DATA_EXFILTRATION]: The skill includes functionality to upload user documents and URLs to the Readwise Reader service. While Readwise is a well-known and legitimate service, this feature involves transmitting user-provided data to an external third-party platform.
Audit Metadata