db-load-git

Pass

Audited by Gen Agent Trust Hub on Mar 4, 2026

Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
  • [COMMAND_EXECUTION]: In the script scripts/db-load-git.ps1, the skill executes the local git binary to identify changes via git diff and git ls-files commands.
  • [COMMAND_EXECUTION]: In the script scripts/db-load-git.ps1, the skill launches the 1C:Enterprise platform (1cv8.exe) using Start-Process to perform the configuration loading task in designer mode.
  • [DATA_EXPOSURE_AND_EXFILTRATION]: The skill handles a database password parameter which is passed as a command-line argument to the 1C executable. This presents a potential risk of credential exposure to local system monitoring tools, although this is the standard method for 1C automation.
  • [INDIRECT_PROMPT_INJECTION]: The skill possesses an attack surface for indirect prompt injection as it relies on configuration data from the .v8-project.json file and file lists returned by the local Git environment.
  • Ingestion points: Reads the .v8-project.json file and processes file path strings from Git output.
  • Boundary markers: Not present; values are interpolated directly into command arguments.
  • Capability inventory: The skill can execute local binaries (git, 1cv8.exe) and manage temporary files.
  • Sanitization: Basic path normalization and input validation (e.g., ValidateSet for sources) are implemented, but the skill fundamentally trusts the repository's metadata and structure.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 4, 2026, 10:07 AM