repo-value-analysis
Pass
Audited by Gen Agent Trust Hub on Apr 1, 2026
Risk Level: SAFEPROMPT_INJECTIONDATA_EXFILTRATIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because it mandates reading "EVERY file" in an external, untrusted repository during the deep-read phase.
- Ingestion points: Untrusted data enters via
git cloneof user-provided URLs, which is then processed by theReadtool inPhase 2. - Boundary markers: No delimiters or "ignore embedded instructions" warnings are provided to sub-agents when processing external file content.
- Capability inventory: The agent has access to
Bash,Write,Read, andAgenttools, which can be misused if an injection occurs. - Sanitization: There is no evidence of sanitization, filtering, or validation of the content read from external repositories.
- [DATA_EXFILTRATION]: In
Phase 3, the skill performs a detailed inventory of the localclaude-code-toolkitrepository and stores it in/tmp/self-inventory.md. This sensitive metadata, combined with the lack of boundaries when reading external files, creates a risk where a malicious repository could trick the agent into exfiltrating the local inventory. - [EXTERNAL_DOWNLOADS]: The skill uses
git cloneto download repositories from arbitrary URLs provided by the user. While this is the primary purpose of the skill, it introduces untrusted code and prompts into the agent's working environment. - [COMMAND_EXECUTION]: The skill utilizes the
Bashtool for cloning and repository management. If a sub-agent is compromised via indirect prompt injection, this tool could be exploited to run arbitrary commands on the host system.
Audit Metadata