rewrite-commit-history
Pass
Audited by Gen Agent Trust Hub on Apr 7, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes multiple local shell and git commands, including
git status,git log,git reset,git add, andgit commit. These operations are localized to the user's repository and are necessary for the skill's stated purpose of history rewriting. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection as it ingests untrusted data from the repository.
- Ingestion points: The skill reads data from
git logandgit diffoutput in Step 3 (Analyze) to identify logical units of work. - Boundary markers: No explicit boundary markers or instructions to ignore embedded commands are used when analyzing the repository content.
- Capability inventory: The skill has the capability to modify the repository state through
git reset --soft,git add, andgit commitcommands. - Sanitization: No sanitization or filtering is applied to the git diff/log output before it is processed by the agent to create the commit plan.
- Mitigation: The workflow includes a mandatory confirmation step (Step 5) where the user must manually approve the proposed commit sequence before any destructive actions or commits occur.
Audit Metadata