buddy-reroll
Fail
Audited by Gen Agent Trust Hub on Apr 1, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [DATA_EXPOSURE_AND_EXFILTRATION]: The skill reads the user's Claude configuration file located at
~/.claude.jsonor~/.claude/.config.json. This file contains sensitive information including account identifiers likeaccountUuidanduserID. While no direct network exfiltration is observed, the access to these private configuration files is a security concern.- [PRIVILEGE_ESCALATION]: The skill performs an intrusive modification of the system's software environment by patching thecli.jsfile of the installedclaude-codepackage. It uses regex to replace an internal constant (SALT) and overwrites the file usingfs.writeFileSync. Modifying application source code is a high-risk operation that can compromise the integrity of the tool.- [COMMAND_EXECUTION]: The script useschild_process.execSyncto run shell commands likewhich claude,readlink, andnpm root -g. These commands are used to discover the installation path of Claude Code for the purpose of patching its source code.
Recommendations
- AI detected serious security threats
Audit Metadata