git-commit-guide
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION] (HIGH): The skill defines
autoExecute: trueandscriptPath: check-git.shin its YAML frontmatter. Because the actual script content is not provided for auditing, this configuration represents an unverified execution path that runs automatically upon Git-related triggers. - [PROMPT_INJECTION] (HIGH): This skill is vulnerable to Indirect Prompt Injection (Category 8).
- Ingestion points: Triggers on untrusted data from
git commitandcommit messageinputs. - Boundary markers: None present; the skill treats commit messages as direct input.
- Capability inventory: Has the capability to execute Bash scripts (
scriptType: bash). - Sanitization: No evidence of sanitization or escaping for the ingested commit data before it interacts with the execution environment.
- [EXTERNAL_DOWNLOADS] (MEDIUM): The documentation instructs users to execute
npm install -g commitizen cz-conventional-changelog. These are unversioned global installations of third-party packages, which increases the supply chain risk and introduces external code into the user's environment.
Recommendations
- AI detected serious security threats
Audit Metadata