stacksmith-ops
Warn
Audited by Gen Agent Trust Hub on Apr 4, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
/stacksmith-ops learn searchcommand is vulnerable to shell command injection. The skill interpolates the user-provided<query>directly into agrepcommand (grep -i "$_QUERY" ...) without any sanitization or escaping. This allows a user to execute arbitrary commands by including shell metacharacters such as semicolons, pipes, or backticks in their search terms. - [COMMAND_EXECUTION]: In 'health' mode, the skill is instructed to parse and execute shell commands exactly as they appear in the
CLAUDE.mdfile. This creates a direct path for arbitrary command execution based on untrusted project content. If an attacker can modify the repository's documentation (e.g., through a Pull Request), they can trigger malicious code execution when the health audit is run. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because it ingests untrusted data from a local file and uses it to drive agent actions without validation.
- Ingestion points: The
CLAUDE.mdfile, specifically the## Health Stacksection, is used as a source for shell commands. - Boundary markers: Absent; the skill lacks delimiters or instructions to ignore malicious embedded commands in the file content.
- Capability inventory: The skill uses the
Bashtool to execute the strings it reads from the project file. - Sanitization: Absent; the skill does not perform any validation, filtering, or escaping of the commands before they are executed.
Audit Metadata