db-load-git
Pass
Audited by Gen Agent Trust Hub on Mar 4, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: In the script
scripts/db-load-git.ps1, the skill executes the localgitbinary to identify changes viagit diffandgit ls-filescommands. - [COMMAND_EXECUTION]: In the script
scripts/db-load-git.ps1, the skill launches the 1C:Enterprise platform (1cv8.exe) usingStart-Processto perform the configuration loading task in designer mode. - [DATA_EXPOSURE_AND_EXFILTRATION]: The skill handles a database password parameter which is passed as a command-line argument to the 1C executable. This presents a potential risk of credential exposure to local system monitoring tools, although this is the standard method for 1C automation.
- [INDIRECT_PROMPT_INJECTION]: The skill possesses an attack surface for indirect prompt injection as it relies on configuration data from the
.v8-project.jsonfile and file lists returned by the local Git environment. - Ingestion points: Reads the
.v8-project.jsonfile and processes file path strings from Git output. - Boundary markers: Not present; values are interpolated directly into command arguments.
- Capability inventory: The skill can execute local binaries (
git,1cv8.exe) and manage temporary files. - Sanitization: Basic path normalization and input validation (e.g.,
ValidateSetfor sources) are implemented, but the skill fundamentally trusts the repository's metadata and structure.
Audit Metadata