agent-os-profile-critique
Fail
Audited by Gen Agent Trust Hub on May 11, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONPROMPT_INJECTIONREMOTE_CODE_EXECUTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The script
.workspace/run-trigger-eval.shperforms highly sensitive operations on the~/.claudedirectory, which typically stores active session tokens and authentication configuration. It renames the directory and selectively copies auth-related folders (sessions, config, statsig), which could be exploited to hijack or expose credentials if the script or the backup location is compromised. - [COMMAND_EXECUTION]: The skill contains instructions for destructive commands and complex shell logic. The file
references/v2-vs-v3.mdprovidesrm -rfcommands targeting the.claudedirectory structure. Additionally,.workspace/run-trigger-eval.shexecutes shell commands that modify the user's home directory and authentication state. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection. Because its primary purpose is to read and critique external data (Agent OS standards), there is a significant surface for malicious instructions to be embedded in the files being audited. The skill lacks boundary markers or explicit 'data-only' processing instructions to prevent the agent from obeying commands found within those files.
- [REMOTE_CODE_EXECUTION]: The file
.workspace/run-trigger-eval.shuses dynamic execution patterns, including executing a Python heredoc and manipulating thePYTHONPATHenvironment variable to load modules from runtime-constructed paths (e.g.,$HOME/.claude-back/skills/create-a-skill).
Recommendations
- AI detected serious security threats
Audit Metadata