rewrite-commit-history

Pass

Audited by Gen Agent Trust Hub on Apr 7, 2026

Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill executes multiple local shell and git commands, including git status, git log, git reset, git add, and git commit. These operations are localized to the user's repository and are necessary for the skill's stated purpose of history rewriting.
  • [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection as it ingests untrusted data from the repository.
  • Ingestion points: The skill reads data from git log and git diff output in Step 3 (Analyze) to identify logical units of work.
  • Boundary markers: No explicit boundary markers or instructions to ignore embedded commands are used when analyzing the repository content.
  • Capability inventory: The skill has the capability to modify the repository state through git reset --soft, git add, and git commit commands.
  • Sanitization: No sanitization or filtering is applied to the git diff/log output before it is processed by the agent to create the commit plan.
  • Mitigation: The workflow includes a mandatory confirmation step (Step 5) where the user must manually approve the proposed commit sequence before any destructive actions or commits occur.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 7, 2026, 11:51 AM