changelog
Warn
Audited by Gen Agent Trust Hub on Feb 21, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- COMMAND_EXECUTION (MEDIUM): The script
scripts/changelog-generator.pyusessubprocess.run(..., shell=True)and directly interpolates variablesfrom_refandto_refinto the command string. This allows for arbitrary shell command execution if a user provides a maliciously crafted git reference. - EXTERNAL_DOWNLOADS (LOW): Documentation in
SKILL.mdandreferences/tools.mdpromotes the installation of third-party tools vianpm,pip, andcargo. While sources likegoogleapis(release-please) are trusted, these installations execute external code on the local system. - PROMPT_INJECTION (LOW): The skill is vulnerable to indirect prompt injection as it ingests git logs (untrusted input) in
scripts/changelog-generator.pyand preserves them in the generatedCHANGELOG.md. This content could be used to manipulate an agent that reads the changelog. Evidence: 1. Ingestion point: Git log command inscripts/changelog-generator.py. 2. Boundary markers: Absent. 3. Capability inventory: File writing and shell execution inscripts/changelog-generator.py. 4. Sanitization: Absent.
Audit Metadata