code-changelog
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- COMMAND_EXECUTION (MEDIUM): The README describes a Python wrapper (
code_changelog_tracker.py) that manages shell processes forhonkit buildandhonkit serve. The use ofsubprocessor similar execution methods to run these commands poses a risk of command injection if variables likeproject_name,file_path, orreasonare not strictly sanitized before being passed to the shell. - EXTERNAL_DOWNLOADS (LOW): Setup requires installing the
honkitpackage globally vianpm. While HonKit is a legitimate documentation tool, it is an external dependency from a non-trusted source (per the defined list), which introduces standard supply chain risks. - INDIRECT_PROMPT_INJECTION (LOW): The skill ingests untrusted code snippets and user-provided 'reasons' for changes to generate documentation.
- Ingestion points:
log_file_creationandlog_file_modificationmethods (File: README.txt) - Boundary markers: None mentioned or implemented in the described usage.
- Capability inventory: Shell execution of build tools and local web server hosting (File: README.txt)
- Sanitization: No sanitization or escaping of the ingested code content is mentioned.
- PRIVILEGE_ESCALATION (LOW): The documentation suggests a global npm installation (
npm install -g), which frequently requires elevated privileges (sudo) on Unix-like systems, increasing the impact of any malicious code within the package or its installation scripts.
Audit Metadata