skills/hsablonniere/skills/rebase/Gen Agent Trust Hub

rebase

Fail

Audited by Gen Agent Trust Hub on Feb 16, 2026

Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION] (HIGH): The script git-rebase-non-interactive.js is susceptible to shell command injection because it interpolates the target argument directly into execSync without any validation or sanitization, allowing an attacker to execute arbitrary commands by manipulating the target parameter.
  • [PROMPT_INJECTION] (HIGH): The skill processes git rebase 'todo' lists that may be derived from untrusted external data (such as PR descriptions); since the git rebase instruction set includes the exec command, an attacker can achieve arbitrary code execution on the host by including malicious shell commands in the provided instructions.
  • [COMMAND_EXECUTION] (MEDIUM): The script dynamically constructs a shell command for the GIT_SEQUENCE_EDITOR environment variable; while it performs basic single-quote escaping, it does not implement any filtering of the git actions, leaving the host vulnerable to any command supported by the git rebase sequencer.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 16, 2026, 08:16 AM