peach-think-team
Pass
Audited by Gen Agent Trust Hub on Apr 4, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes local shell commands (
cat,grep,echo) to verify configuration settings in~/.claude/settings.jsonand detect the presence of environment variables or plugins. It also uses a Python one-liner in Section 8 ofSKILL.mdto modify its own internal configuration file (~/.claude/teams/[team_name]/config.json) for team cleanup tasks. - [PROMPT_INJECTION]: The skill exhibits a significant surface for indirect prompt injection (Category 8).
- Ingestion points: Arbitrary user-supplied topics, project context, and task descriptions enter the agent context through the main orchestrator interface.
- Boundary markers: While the prompt templates in
references/team-patterns.mduse markdown headers (e.g.,## 배경), they lack explicit instructions or strict delimiters to prevent sub-agents from executing commands or following instructions embedded within the user-provided data. - Capability inventory: The skill orchestrates sub-agents with extensive capabilities, including file system modification (
devandreviewerroles) and arbitrary shell command execution (thedeployerrole explicitly prompts the agent to run provided bash commands). - Sanitization: There is no evidence of validation, escaping, or sanitization of the user-provided input before it is interpolated into the prompts for sub-agents.
Audit Metadata