rebase
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (HIGH): The script
git-rebase-non-interactive.jsis susceptible to shell command injection because it interpolates thetargetargument directly intoexecSyncwithout any validation or sanitization, allowing an attacker to execute arbitrary commands by manipulating the target parameter. - [PROMPT_INJECTION] (HIGH): The skill processes git rebase 'todo' lists that may be derived from untrusted external data (such as PR descriptions); since the git rebase instruction set includes the
execcommand, an attacker can achieve arbitrary code execution on the host by including malicious shell commands in the provided instructions. - [COMMAND_EXECUTION] (MEDIUM): The script dynamically constructs a shell command for the
GIT_SEQUENCE_EDITORenvironment variable; while it performs basic single-quote escaping, it does not implement any filtering of the git actions, leaving the host vulnerable to any command supported by the git rebase sequencer.
Recommendations
- AI detected serious security threats
Audit Metadata