system-audit
Pass
Audited by Gen Agent Trust Hub on May 13, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill performs extensive system introspection using Bash commands such as
find,grep,ls,git, andstatacross the Task Management system and research project directories. - [EXTERNAL_DOWNLOADS]: Executes
npx agnix, which involves the Node Package Runner fetching and executing a package from the npm registry if not present locally. - [DATA_EXPOSURE]: Accesses sensitive configuration files including
~/.claude/settings.jsonandclaude_desktop_config.jsonto audit MCP server alignment and symlink integrity. The findings are consolidated into a local report file. - [COMMAND_EXECUTION]: Sub-agents perform environment reconnaissance by checking for the presence and responsiveness of CLI tools like
gh,uv,jq, andgeminiusingwhichand version flags. - [DATA_EXPOSURE]: Scans research project directories to audit bibliography files (.bib) and check for the presence of MEMORY.md files, aggregating metadata for the health report.
- [INDIRECT_PROMPT_INJECTION]: The skill processes untrusted content by reading the frontmatter and content of various skill, agent, and project files. While it lacks explicit boundary markers or sanitization, its operations are restricted to reporting and auditing, posing a minimal risk in this context.
Audit Metadata