autonomous-skill
Fail
Audited by Gen Agent Trust Hub on Apr 26, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Critical shell command injection vulnerability in
scripts/run-session.shandscripts/setup-loop.sh. Input variables such as$task_descand$task_nameare interpolated intoclaude -pshell commands and unquoted heredocs. Malicious input containing characters like\",;, or`can terminate the intended command and execute arbitrary shell commands on the user's machine. - [COMMAND_EXECUTION]: The skill defaults to
bypassPermissionsmode for the Claude Code CLI inscripts/run-session.sh, enabling the agent to perform all actions—including file system modifications and deletions—without user approval. This high-privilege configuration contradicts theSKILL.mddocumentation, which incorrectly lists the default asauto(user-prompted). - [PROMPT_INJECTION]: High risk of indirect prompt injection. Ingestion points:
{TASK_DIR}/task_list.md,{TASK_DIR}/progress.md, and various project files (as specified intemplates/executor-prompt.md). Boundary markers: Absent; there are no instructions or delimiters designed to isolate and ignore malicious commands within processed data. Capability inventory: Full system access across multiple sessions using theclaudeCLI withbypassPermissionsenabled. Sanitization: Absent; the agent is explicitly instructed to 'trust the order' of tasks and the state found in tracking files. - [COMMAND_EXECUTION]: The script
scripts/run-session.shintentionally unsets theCLAUDECODEenvironment variable to permit nested agent execution. This bypasses the CLI's standard safety mechanism designed to prevent uncontrolled recursion and unauthorized sub-sessions.
Recommendations
- AI detected serious security threats
Audit Metadata