chezmoi-config

Fail

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
  • REMOTE_CODE_EXECUTION (HIGH): The file references/scripts.md contains multiple examples of piped remote execution, such as installing Homebrew and Oh My Zsh via "curl | bash" and "sh -c $(curl)".
  • COMMAND_EXECUTION (HIGH): Script examples in references/scripts.md demonstrate the use of "sudo" for privileged operations like system updates and package installations.
  • EXTERNAL_DOWNLOADS (MEDIUM): Documentation in references/external-files.md details the ".chezmoiexternal" mechanism, which automatically downloads and extracts files and archives from external URLs at runtime.
  • PROMPT_INJECTION (LOW): The skill handles untrusted data which presents an indirect injection surface. Evidence Chain: 1. Ingestion points: ".chezmoiexternal" (references/external-files.md) and ".chezmoidata" (references/advanced-configuration.md). 2. Boundary markers: Absent (uses direct template interpolation). 3. Capability inventory: Arbitrary shell command execution and privilege escalation (references/scripts.md). 4. Sanitization: Documentation recommends use of the "| quote" filter (references/template-syntax.md) but it is not enforced by the system.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 17, 2026, 06:18 PM