buddy-reroll

Fail

Audited by Gen Agent Trust Hub on Apr 1, 2026

Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
  • [DATA_EXPOSURE_AND_EXFILTRATION]: The skill reads the user's Claude configuration file located at ~/.claude.json or ~/.claude/.config.json. This file contains sensitive information including account identifiers like accountUuid and userID. While no direct network exfiltration is observed, the access to these private configuration files is a security concern.- [PRIVILEGE_ESCALATION]: The skill performs an intrusive modification of the system's software environment by patching the cli.js file of the installed claude-code package. It uses regex to replace an internal constant (SALT) and overwrites the file using fs.writeFileSync. Modifying application source code is a high-risk operation that can compromise the integrity of the tool.- [COMMAND_EXECUTION]: The script uses child_process.execSync to run shell commands like which claude, readlink, and npm root -g. These commands are used to discover the installation path of Claude Code for the purpose of patching its source code.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Apr 1, 2026, 05:51 AM