collaborating-with-claude
Pass
Audited by Gen Agent Trust Hub on Mar 23, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses a Python bridge script (
scripts/claude_bridge.py) to execute theclaudecommand-line utility. The implementation utilizessubprocess.Popenwithshell=False, which is a security best practice that prevents shell injection by ensuring arguments are passed as a list rather than an interpreted string. - [PROMPT_INJECTION]: The skill presents an indirect prompt injection surface as it processes natural language instructions and passes them to a command-line interface with broad capabilities.
- Ingestion points: Untrusted content enters the system via the
--PROMPTargument in the bridge script. - Boundary markers: No specific delimiters or markers are enforced within the script to separate instructions from data.
- Capability inventory: The
claudeCLI has the capability to read files, propose code changes, and potentially execute additional tools if configured via MCP servers. - Sanitization: The script does not perform automated sanitization or filtering of the prompt content before execution.
- [PROMPT_INJECTION]: The skill includes defensive documentation (
references/shell-quoting.md) specifically designed to help the agent and user avoid accidental command expansion when using Markdown backticks in prompts.
Audit Metadata