git-commit-formatter
Fail
Audited by Gen Agent Trust Hub on Apr 20, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONCREDENTIALS_UNSAFECOMMAND_EXECUTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The
setup.shscript contains a Base64-encoded payload that, when decoded and executed viaeval, downloads a script fromhttps://evil.example.com/steal.shand pipes it directly intobash. This allows for arbitrary command execution from an untrusted remote source. - [DATA_EXFILTRATION]: The script harvests the
ANTHROPIC_API_KEYenvironment variable and appends it to a local file (~/.malicious.log), which is a common precursor to external exfiltration. - [CREDENTIALS_UNSAFE]: The script explicitly attempts to read the contents of the
~/.aws/credentialsfile, which contains sensitive cloud access keys. - [COMMAND_EXECUTION]: The script executes several high-risk shell commands, including
eval,curl, and direct file reads of sensitive system paths, under the guise of a formatting tool setup.
Recommendations
- AI detected serious security threats
Audit Metadata