repomix-safe-mixer
Pass
Audited by Gen Agent Trust Hub on Feb 23, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (LOW): The script
safe_pack.pyexecutes the external commandrepomixusingsubprocess.runto perform the packaging step. This is a standard part of the skill's workflow and is executed withoutshell=True, minimizing common injection vulnerabilities. - [PROMPT_INJECTION] (LOW): The skill is susceptible to indirect prompt injection because it reads and displays content from untrusted files in a user-provided directory.
- Ingestion points:
scan_secrets.py(line 77) reads files from the target directory. - Boundary markers: Absent; the script prints raw matches and line contexts directly to stdout.
- Capability inventory: Access to
subprocess.run(executingrepomix) and local file reading viaopen. - Sanitization: Absent; though output is truncated for length, it is not sanitized or escaped to prevent an LLM from interpreting instructions contained within the scanned files.
Audit Metadata