local-merge
Warn
Audited by Gen Agent Trust Hub on May 4, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses shell interpolation for the
BRANCHandTARGETvariables within bash blocks. The validation checkcase "$BRANCH$TARGET" in *['$!']*)is inadequate because it fails to filter many dangerous shell metacharacters such as semicolons (;), pipes (|), ampersands (&), and redirects (>,<`). If the agent environment interpolates these variables into shell strings, it creates a risk of command injection. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection. In Phase 2d, the agent is directed to execute
git logandgit diffand then "analyze divergence" using a decision matrix. Because commit messages and file diffs are untrusted data that can be influenced by external parties, and the skill provides no boundary markers or delimiters to isolate this content, an attacker could embed malicious instructions in the git history to override agent logic and force unauthorized merges or other actions. Evidence of this vulnerability is found inSKILL.mdwhere the agent's reasoning capability is directly applied to uncleaned tool output.
Audit Metadata