dotfiles

Warn

Audited by Gen Agent Trust Hub on Apr 14, 2026

Risk Level: MEDIUMDATA_EXFILTRATIONREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [DATA_EXFILTRATION]: Accesses sensitive configuration files. \n
  • File: scripts/dotfiles-backup.sh \n
  • Evidence: The script identifies and copies ~/.ssh/config to a local backup directory. \n- [REMOTE_CODE_EXECUTION]: Executes an installation script from an external source. \n
  • File: SKILL.md \n
  • Evidence: Provides instructions to download and execute the Chezmoi installer via sh -c "$(curl -fsLS get.chezmoi.io)". \n- [EXTERNAL_DOWNLOADS]: Fetches configurations from remote repositories. \n
  • File: SKILL.md, references/dotfiles-guide.md \n
  • Evidence: Instructs users to clone dotfile repositories from GitHub (e.g., https://github.com/user/dotfiles.git) to synchronize machine settings. \n- [COMMAND_EXECUTION]: Performs file system operations and version control commands. \n
  • File: scripts/dotfiles-backup.sh, scripts/dotfiles-sync.sh \n
  • Evidence: Utilizes shell commands including cp, mkdir, and git for local file organization and tracking. \n- [PROMPT_INJECTION]: Potential for indirect prompt injection via untrusted external configuration repositories. \n
  • Ingestion points: User-specified Git repositories via chezmoi init and git clone. \n
  • Boundary markers: Not present in the automated scripts. \n
  • Capability inventory: Capability to modify home directory files and execute shell commands for synchronization. \n
  • Sanitization: No sanitization is performed on the content of the downloaded repositories before application.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Apr 14, 2026, 01:23 AM