This agent skill allows arbitrary command execution,
Claims to do
Agent Development for Claude Code Plugins: Agents are autonomous subprocesses that handle complex, multi-step tasks independently. Understanding agent structure, triggering conditions, and system prompt design enables creating powerful autonomous capabilities.
Actually does
This skill provides comprehensive documentation and best practices for developing 'agents' within Claude Code plugins. It details the structure of agent markdown files, including YAML frontmatter fields (name, description, model, color, tools) and the system prompt body. It offers guidance on defining triggering conditions, choosing models and colors, restricting tool access, writing effective system prompts, validation rules, and methods for creating and testing agents. It does not execute any commands, access external data, or contact URLs.
Agents are explicitly allowed to use the `Bash` tool, granting arbitrary command execution capabilities. This poses a critical risk for reverse shells, data exfiltration, persistence, privilege escalation, and system compromise.
`tools: ["Read", "Write", "Grep", "Bash"]`, `Common tool sets: ... ["Read", "Bash", "Grep"]`
If the `tools` field is omitted, agents default to having access to all tools, including `Bash` and `Write`. The `Write` tool allows file modification, which can be used for persistence, data manipulation, or resource abuse.
`Default: If omitted, agent has access to all tools`, `tools: ["Read", "Write", "Grep"]`
Agents are automatically discovered and loaded from `.md` files within the `agents/` directory. This creates a supply chain risk where an attacker could introduce a malicious agent file, which would then be loaded and potentially executed with elevated privileges.
`All .md files in agents/ are auto-discovered.`
The `description` and `system prompt` fields are user-defined and directly control agent triggering and behavior. Malicious input in these critical fields can lead to prompt injection, semantic manipulation, or hidden instructions, potentially bypassing safety mechanisms.
`description (required) ... This is the most critical field.`, `The markdown body becomes the agent's system prompt.`
The AI-assisted agent generation process takes a user-provided description (`[YOUR DESCRIPTION]`) to create an agent's configuration, including its system prompt. An attacker could craft this input to inject malicious instructions into the generated agent, leading to a meta-prompt injection attack.
`Create an agent configuration based on this request: "[YOUR DESCRIPTION]"`, `Return JSON with: ... "systemPrompt": "You are..."`
[](https://mondoo.com/ai-agent-security/skills/github/anthropics/claude-code/agent-development)<a href="https://mondoo.com/ai-agent-security/skills/github/anthropics/claude-code/agent-development"><img src="https://mondoo.com/ai-agent-security/api/badge/github/anthropics/claude-code/agent-development.svg" alt="Mondoo Skill Check" /></a>https://mondoo.com/ai-agent-security/api/badge/github/anthropics/claude-code/agent-development.svgSkills can read files, run commands, and access credentials. Mondoo helps organizations manage the security risks of AI agent skills across their entire fleet.