repomix
Pass
Audited by Gen Agent Trust Hub on Mar 7, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
repomix_batch.pyscript executes therepomixCLI andnpxviasubprocess.run. It uses a list-based argument structure to prevent shell injection. - [EXTERNAL_DOWNLOADS]: The skill uses
npxto fetch and run therepomixpackage for remote repositories. Repomix is a recognized community tool for preparing codebase context. - [PROMPT_INJECTION]: The skill's primary function is to ingest repository content for LLM context, which constitutes an indirect prompt injection surface.
- Ingestion points: Reads files from repositories via the
repomixCLI. - Boundary markers: Uses XML or Markdown markers for file separation; however, these are not robust against adversarial content.
- Capability inventory: Subprocess execution and local file system writes.
- Sanitization: Relies on
repomix's internalSecretlintfor credential detection but does not filter content for injection patterns. - [CREDENTIALS_UNSAFE]: The
EnvLoaderclass inrepomix_batch.pysearches for and loads environment variables from several parent directory locations, including.envfiles that may contain sensitive agent configuration.
Audit Metadata