repo-search
Warn
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [REMOTE_CODE_EXECUTION]: The
query.pyscript usespickle.load()to deserialize the BM25 keyword index from the.vectordbdirectory. Thepicklemodule is inherently insecure as it can be used to execute arbitrary code during deserialization if a malicious file is provided. An attacker who manages to place a crafted pickle file in the repository's database directory could achieve code execution when the skill is used. - [COMMAND_EXECUTION]: The skill uses
subprocess.run()inquery.pyto execute thegit rev-parse --show-toplevelcommand. This is used for automatic detection of the repository root directory when no database path is explicitly provided. - [PROMPT_INJECTION]: The skill has a surface for indirect prompt injection as it processes and retrieves content from external, untrusted documents.
- Ingestion points: The
ingest.pyscript extracts text from Markdown, PDF, Word, and Excel files within the user's repository. - Boundary markers: Chunks are prepended with basic metadata (titles and heading hierarchies), but do not include robust security delimiters or instructions to ignore embedded commands.
- Capability inventory: The skill can read arbitrary local files and execute specific shell commands, which could be exploited if an agent follows instructions found within indexed documents.
- Sanitization: No sanitization or safety filtering is applied to the extracted text content before it is provided to the agent.
- [EXTERNAL_DOWNLOADS]: The
install.shandsetup.shscripts facilitate the installation of necessary Python dependencies from the official Python Package Index (PyPI) to create the skill's runtime environment.
Audit Metadata