composer-upgrade
Warn
Audited by Gen Agent Trust Hub on Apr 15, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/diff_lock.pygeneratescomposer requireandcomposer removecommands by interpolating package names and versions directly fromcomposer.lockfiles without any shell escaping or sanitization. - [REMOTE_CODE_EXECUTION]: The skill workflow for resolving merge conflicts instructs the agent to execute shell commands generated by the vulnerable
diff_lock.pyscript. - [PROMPT_INJECTION]: The skill has an indirect prompt injection surface as it processes and acts upon untrusted data from external
composer.lockfiles. - Ingestion points:
scripts/diff_lock.pyreadscomposer.lockcontent from local paths or git revisions. - Boundary markers: No delimiters or instructions to ignore embedded malicious content are present.
- Capability inventory: The skill has shell command execution capabilities via
composer,git, andpython3. - Sanitization: No validation or sanitization of the JSON data from lock files is performed before command construction.
- [COMMAND_EXECUTION]: The script
scripts/diff_lock.pyusessubprocess.runto callgit show. While it uses a list to avoid shell injection, therefargument is derived from user input, providing a surface for argument injection.
Audit Metadata