tg-responder
Pass
Audited by Gen Agent Trust Hub on May 9, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/worker.pyscript executes theclaudeCLI and a helper script from a separatetelegramskill usingsubprocess.run. These executions are performed using argument lists without a shell wrapper, which effectively prevents command injection from the processed message content. - [PROMPT_INJECTION]: The skill is subject to indirect prompt injection because it processes untrusted Telegram messages that are interpolated into a classification prompt. While the skill uses JSON to wrap the input, an adversarial message could attempt to manipulate the LLM's classification or drafting logic.
- Ingestion points: Incoming Telegram message text is read from the
inboxtable inscripts/worker.pyand passed to the classification engine. - Boundary markers: The user-provided message text is serialized into a JSON object using
json.dumpsbefore being passed to the Claude CLI as a prompt argument. - Capability inventory: The skill has the capability to read local files, manage a local database, and trigger message sending via the
telegramskill's scripts. - Sanitization: External content is sanitized via JSON encoding to prevent it from escaping the input field in the prompt structure.
Audit Metadata