control-metalayer-loop
Warn
Audited by Gen Agent Trust Hub on Mar 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: Multiple template scripts designed to be installed into target repositories (including
check.sh,smoke.sh,test.sh,web_e2e.sh, andcli_e2e.sh) use theevalcommand to execute content provided via environment variables such asCONTROL_CHECK_CMDandCONTROL_TEST_CMD. This enables arbitrary shell command execution if these variables are influenced by untrusted sources. - [COMMAND_EXECUTION]: The
scripts/control_wizard.pytool usessubprocess.runto execute bash scripts (bootstrap_control.shandaudit_control.sh) for repository setup and compliance auditing. - [COMMAND_EXECUTION]: The skill implements persistence and execution control by modifying the local Git configuration (
core.hooksPath) viascripts/control/install_hooks.sh. This redirects standard Git hooks to a skill-managed directory (.githooks), ensuring specific scripts run during Git operations.
Audit Metadata