dotfiles
Warn
Audited by Gen Agent Trust Hub on Apr 14, 2026
Risk Level: MEDIUMDATA_EXFILTRATIONREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [DATA_EXFILTRATION]: Accesses sensitive configuration files. \n
- File:
scripts/dotfiles-backup.sh\n - Evidence: The script identifies and copies
~/.ssh/configto a local backup directory. \n- [REMOTE_CODE_EXECUTION]: Executes an installation script from an external source. \n - File:
SKILL.md\n - Evidence: Provides instructions to download and execute the Chezmoi installer via
sh -c "$(curl -fsLS get.chezmoi.io)". \n- [EXTERNAL_DOWNLOADS]: Fetches configurations from remote repositories. \n - File:
SKILL.md,references/dotfiles-guide.md\n - Evidence: Instructs users to clone dotfile repositories from GitHub (e.g.,
https://github.com/user/dotfiles.git) to synchronize machine settings. \n- [COMMAND_EXECUTION]: Performs file system operations and version control commands. \n - File:
scripts/dotfiles-backup.sh,scripts/dotfiles-sync.sh\n - Evidence: Utilizes shell commands including
cp,mkdir, andgitfor local file organization and tracking. \n- [PROMPT_INJECTION]: Potential for indirect prompt injection via untrusted external configuration repositories. \n - Ingestion points: User-specified Git repositories via
chezmoi initandgit clone. \n - Boundary markers: Not present in the automated scripts. \n
- Capability inventory: Capability to modify home directory files and execute shell commands for synchronization. \n
- Sanitization: No sanitization is performed on the content of the downloaded repositories before application.
Audit Metadata