git-commit-workflow
Pass
Audited by Gen Agent Trust Hub on Mar 8, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Executes a local helper script
scripts/commit-context.shand standard Git commands to gather repository state and metadata. - [EXTERNAL_DOWNLOADS]: Fetches open issue titles and numbers from GitHub using the official
ghCLI for commit message referencing. This targets a well-known and trusted service. - [PROMPT_INJECTION]: Contains a potential surface for indirect prompt injection through the processing of untrusted data (Git diffs, commit history, and GitHub issue titles) which are used to inform the agent's commit message generation.
- Ingestion points:
scripts/commit-context.shretrieves repository status, diffs, and external GitHub issue metadata. - Boundary markers: The script uses clear textual delimiters (e.g.,
--- STATUS ---,--- OPEN ISSUES ---) to separate different data types in the output. - Capability inventory: The agent possesses
BashandReadtools, enabling it to execute commands and read file content. - Sanitization: No explicit sanitization or filtering is performed on external issue titles or internal Git metadata before presentation to the agent.
Audit Metadata