worktrees
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION] (HIGH): The
scripts/shutdown-services.shscript is vulnerable to command injection. It extracts a port number from a.envfile and interpolates it directly into a subshell:kill $(lsof -ti:${SERVER_PORT}). If the.envfile (potentially from an untrusted project) contains a malicious value like8080; <command>, the command will be executed. - [COMMAND_EXECUTION] (MEDIUM): The skill uses
killto terminate processes andsedto modify configuration files. These are high-risk operations that can lead to denial of service or misconfiguration if inputs from the environment are not strictly validated. - [EXTERNAL_DOWNLOADS] (LOW): The
apps.mdguide instructs the agent to runmake tailwindcss, which downloads and executes an external binary. The skill does not verify the source, version, or integrity of this download. - [PROMPT_INJECTION] (LOW): The skill exhibits an indirect prompt injection surface (Category 8). 1. Ingestion points: User-supplied branch names in
SKILL.md. 2. Boundary markers: None. 3. Capability inventory: Shell execution (git,sed,cp,bash), directory creation, and process management. 4. Sanitization: Absent; branch names are used directly in shell command strings without validation, creating risks for path traversal or injection.
Recommendations
- AI detected serious security threats
Audit Metadata