workflow-creator
Warn
Audited by Gen Agent Trust Hub on Mar 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses complex shell commands to dynamically resolve file paths. Evidence: The use of
command ls -d ~/.claude/plugins/cache/edwinhu-plugins/workflows/*/PHILOSOPHY.md 2>/dev/null | sort -V | tail -1inSKILL.md. - [REMOTE_CODE_EXECUTION]: The skill generates and executes shell commands that dynamically compute the path to Python scripts. Evidence: In
SKILL.mdMode 3, it recommends the patternSCRIPTS=$(command ls -d ... | tail -1) && python3 "$SCRIPTS/script.py". This constitutes dynamic execution from computed paths. - [PROMPT_INJECTION]: The skill's workflow auditing feature is a surface for indirect prompt injection. * Ingestion points:
SKILL.md(Mode 2) reads existing workflow files using theRead()tool. * Boundary markers: No delimiters or "ignore embedded instructions" warnings are used when reading user-provided workflow files. * Capability inventory: The skill can execute shell commands (ls), read files, and write files. * Sanitization: There is no evidence of sanitization or content validation for the files being audited. - [DATA_EXFILTRATION]: The skill performs targeted reading of files within the
~/.claude/plugins/cache/directory using dynamic path discovery. This allows access to configuration and logic files stored outside the immediate project working directory.
Audit Metadata