github-evidence-kit
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- COMMAND_EXECUTION (MEDIUM): The
GitClientinsrc/clients/git.pyusessubprocess.runto execute git commands. While it avoids shell injection by using a list of arguments, several methods likeget_commit,get_log, andcat_filepass user-provided strings (SHAs, refs, and dates) directly as arguments. This allows for argument injection; an attacker providing a malicious SHA or ref could include flags like--ext-diffor--upload-packto execute arbitrary code or alter command behavior. - DATA_EXFILTRATION (LOW): The tool is designed to read forensic data from local and remote repositories. However, the
GitClient.cat_fileandGitHubClient.get_filemethods provide capabilities to read arbitrary file contents, which could be abused to exfiltrate sensitive local information if the agent is manipulated by a malicious prompt. - PROMPT_INJECTION (LOW): The skill presents a significant surface for indirect prompt injection (Category 8). Ingestion points:
src/collectors/api.pyandsrc/collectors/archive.pyfetch natural language content from GitHub, including commit messages, issue bodies, and PR descriptions. Boundary markers: No delimiters or safety instructions are present to prevent the agent from interpreting instructions embedded in this data. Capability inventory: The skill possesses powerful capabilities including local command execution and external network access. Sanitization: No sanitization or validation is performed on ingested strings before they are presented to the agent. - CREDENTIALS_UNSAFE (SAFE): The skill uses environment variables (
GOOGLE_APPLICATION_CREDENTIALS) for BigQuery access and contains no hardcoded secrets.
Audit Metadata