cold-start-check
Fail
Audited by Gen Agent Trust Hub on Apr 26, 2026
Risk Level: HIGHCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The Bash script uses the
evalcommand to process data parsed fromdocs/cold-start-rubric.yml. Because the output of the YAML parser is not sanitized before being passed toeval, an attacker can include shell metacharacters in the rubric prompts or concepts to execute arbitrary commands. - [COMMAND_EXECUTION]: The skill dynamically constructs and executes shell commands for the
claudeCLI using input strings from the rubric file, which allows untrusted repository content to influence system execution.
Recommendations
- AI detected serious security threats
Audit Metadata