infinite-dev
Warn
Audited by Gen Agent Trust Hub on Mar 21, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
dev-agent.pyscript executes theclaudeCLI using the--dangerously-skip-permissionsflag. This flag disables user confirmation prompts for dangerous operations such as file modifications and shell command execution, allowing the agent to operate fully autonomously without human oversight for sensitive system actions.\n- [COMMAND_EXECUTION]: The workflow relies on the AI creating a shell script (init.sh) and then executing it (chmod +x init.sh && ./init.sh). This results in the execution of dynamically generated code that may contain arbitrary commands.\n- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection. Thedev-agent.pyscript reads feature descriptions and steps fromfeature_list.jsonand interpolates them directly into the system prompts of sub-agents without sanitization or the use of boundary markers. A malicious project specification could inject instructions that override the sub-agent's behavior.\n - Ingestion points:
feature_list.json(read byload_featuresindev-agent.pyand used to build prompts inrun_one_featureandrun_parallel_batch).\n - Boundary markers: Absent; data is inserted directly into prompt templates.\n
- Capability inventory: Subprocess execution of git, the claude CLI (with skipped permissions), and initialization scripts.\n
- Sanitization: None.
Audit Metadata