The skill allows arbitrary command execution via `
Claims to do
Context Search (QMD): Search past Claude Code sessions and knowledge bases using QMD.
Actually does
The skill executes a Python script (`search-tool.py`) via `uv run` in a Bash shell. This script reads `search-config.yaml` from the current working directory to search configured collections using an underlying `qmd` tool. It outputs formatted search results including file paths and line numbers.
The `allowed-tools` configuration permits `uv run` with arbitrary arguments (`uv run:*`). This allows an attacker to execute any command or script via `uv run`, potentially leading to full system compromise.
allowed-tools: "Bash(uv run:*)"
The 'your search query' argument passed to `search-tool.py` might be vulnerable to command injection if the script uses it unsanitized in a shell command or external process call.
uv run ${CLAUDE_PLUGIN_ROOT}/skills/context-search/scripts/search-tool.py "your search query"The `search-tool.py` script reads `search-config.yaml` from the current working directory, which can be controlled by the `--cwd` option. An attacker could inject a malicious configuration file to manipulate search results, exfiltrate data, or trigger unintended actions.
uv run ... --cwd /path The tool reads `search-config.yaml` from the working directory
[](https://mondoo.com/ai-agent-security/skills/github/vranac/claude-context-search-qmd/context-search)<a href="https://mondoo.com/ai-agent-security/skills/github/vranac/claude-context-search-qmd/context-search"><img src="https://mondoo.com/ai-agent-security/api/badge/github/vranac/claude-context-search-qmd/context-search.svg" alt="Mondoo Skill Check" /></a>https://mondoo.com/ai-agent-security/api/badge/github/vranac/claude-context-search-qmd/context-search.svgSkills can read files, run commands, and access credentials. Mondoo helps organizations manage the security risks of AI agent skills across their entire fleet.