repomix-safe-mixer
Fail
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTIONCREDENTIALS_UNSAFE
Full Analysis
- Indirect Prompt Injection (HIGH): The skill processes untrusted external data which could contain malicious instructions designed to hijack the agent.\n
- Ingestion points:
scripts/scan_secrets.pyreads content from arbitrary files in the target directory usingopen().\n - Boundary markers: Absent. Content from scanned files is presented to the agent without delimiters or instructions to ignore embedded commands.\n
- Capability inventory:
scripts/safe_pack.pyhas the ability to execute external commands viasubprocess.run(['repomix', ...])andsys.executable.\n - Sanitization: Absent. The script extracts raw matches and context strings from files.\n- Credentials Exposure (HIGH): The skill is explicitly designed to locate and extract high-value secrets (AWS keys, Stripe keys, Private keys).\n
- Evidence:
scripts/scan_secrets.pycontains regex patterns for various credentials and prints them to stdout, placing sensitive data directly into the agent's context window.\n- Command Execution (MEDIUM): The skill executes external tools based on user-provided directory paths and configuration.\n - Evidence:
scripts/safe_pack.pyusessubprocess.runto callrepomix. While it uses an argument list rather than a shell string, control over pathnames and configuration files could potentially influence the execution environment.
Recommendations
- AI detected serious security threats
Audit Metadata