ln-003-push-all
Warn
Audited by Gen Agent Trust Hub on Mar 14, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill dynamically extracts and executes commands found in project documentation files such as README.md, CLAUDE.md, and runbook.md during the linting phase. This behavior can be exploited by an attacker to run arbitrary malicious code if these files are modified to include harmful instructions disguised as linter commands.
- [DATA_EXFILTRATION]: The use of
git add -Afollowed bygit pushstages all untracked and unstaged files. This presents a risk of accidentally pushing sensitive information like environment variables, private keys, or credentials to a remote repository if the.gitignorefile is missing or misconfigured. - [PROMPT_INJECTION]: The skill is susceptible to Indirect Prompt Injection (Category 8) due to its reliance on unverified data for operational instructions. 1. Ingestion points: Reads commands from
README.md,CLAUDE.md,CONTRIBUTING.md, anddocs/project/runbook.md. 2. Boundary markers: Absent; the agent interprets documentation text directly as command sources. 3. Capability inventory: Full shell execution of discovered commands and repository-widegitoperations. 4. Sanitization: Absent; the skill executes the strings it finds without validation beyond the assumption they are linting tools.
Audit Metadata