commit-push
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTIONDATA_EXFILTRATION
Full Analysis
- [Indirect Prompt Injection] (HIGH): The skill is highly vulnerable to indirect prompt injection because it ingests untrusted data and possesses significant side-effect capabilities.
- Ingestion points: The skill reads the output of
git statusandgit diffto analyze code changes (SKILL.md, Step 2 and 3). - Boundary markers: Absent. There are no instructions or delimiters defined to prevent the agent from obeying instructions embedded within the code diffs it is summarizing.
- Capability inventory: The skill executes
git add,git commit(command execution), andgit push(network/exfiltration) (SKILL.md, Step 5 and 6). - Sanitization: While the skill checks for sensitive file names (like
.env), it does not sanitize the content of the diffs. A malicious payload inside a source file could trick the agent into generating a malicious commit message or altering its execution flow. - [Command Execution] (MEDIUM): The skill executes arbitrary Git commands through the shell. Specifically, it uses a HEREDOC pattern in Step 5 to pass LLM-generated strings directly into a
git commitcommand. If the LLM is successfully injected via the diff content, it could be coerced into breaking out of the HEREDOC or manipulating the shell command parameters. - [Data Exfiltration] (LOW): The skill facilitates the movement of local data to remote servers via
git push. Although this is the stated purpose, in a compromised state, this mechanism could be used to push sensitive data to an attacker-controlled repository if the agent is convinced to change the push target or include sensitive files in the commit.
Recommendations
- AI detected serious security threats
Audit Metadata