planning-with-files-de
Warn
Audited by Gen Agent Trust Hub on May 15, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The
Stophook inSKILL.mdperforms dynamic code execution by searching for and running scripts (check-complete.ps1orcheck-complete.sh) within the~/.claude/plugins/cachedirectory. This pattern of locating and executing files by name across a shared cache directory poses a risk of executing unintended or malicious scripts. Additionally, the PowerShell execution bypasses default policies using theRemoteSignedflag.- [PROMPT_INJECTION]: The skill is designed to automatically inject the contents oftask_plan.mdinto the agent's context before every tool call via aPreToolUsehook. This creates a surface for indirect prompt injection where untrusted data written to the plan could influence subsequent agent actions. - Ingestion points:
task_plan.md(read byPreToolUsehook inSKILL.md). - Boundary markers: Absent; the hook directly cats the file content into the prompt.
- Capability inventory: The skill uses
Bash,Write,Edit, andReadtools. - Sanitization: Absent; no validation or filtering is applied to the planning file content.- [DATA_EXFILTRATION]: The
scripts/session-catchup.pyscript accesses and reads internal application session history from the~/.claude/projects/and~/.codex/sessions/directories. While this is used for local context restoration, it involves reading sensitive transcripts of previous user interactions from the file system.
Audit Metadata