review-changes
Warn
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses a shell command pipeline (
echo "$ARGUMENTS" | tr ...) to sanitize user input, which presents a risk of command injection if the input is expanded by the shell environment before or during theechocommand. - [COMMAND_EXECUTION]: It automatically detects and executes project build systems (npm, cargo, go, make), which involves running arbitrary code defined in the repository's own configuration files.
- [COMMAND_EXECUTION]: The skill executes local shell scripts located in the
.chalkdirectory which are managed by a separate sub-skill, representing high-privilege operations using local filesystem resources. - [DATA_EXFILTRATION]: It generates code context packages and "paste-ready" prompts containing full repository diffs and logs for use with third-party AI services, facilitating the transfer of code context out of the local environment.
- [PROMPT_INJECTION]: The skill implements a fix-finding pipeline that parses instructions from potentially untrusted
*.findings.mdfiles to guide automatedEditoperations, creating a surface for indirect prompt injection. - Ingestion points:
git diff,git log, and*.findings.mdfiles from the local filesystem. - Boundary markers: Absent for findings parsing.
- Capability inventory:
Bash,Edit,Write,Glob,Readtools are utilized throughout the pipeline. - Sanitization: Includes path validation to ensure file edits are relative and restricted to the repository.
Audit Metadata