ai-changelog
Warn
Audited by Gen Agent Trust Hub on Mar 27, 2026
Risk Level: MEDIUMCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The Makefile and Justfile templates in
references/build-integration.mdare vulnerable to shell command injection via the version override variable. The templates interpolate the user-provided version string directly into a shell command:uv run scripts/version.py stamp --version "$(V)". If the variableVcontains shell metacharacters such as backticks or semicolons, the shell will execute those commands on the host machine. - [COMMAND_EXECUTION]: The GitHub Actions workflow snippet in
references/build-integration.mdcontains a critical command injection vulnerability in therunstep. By using${{ inputs.version }}directly within a bash script, the template allows any user with permission to trigger the workflow to execute arbitrary code in the CI/CD runner context. This is a violation of security best practices for GitHub Actions. - [COMMAND_EXECUTION]: The Python script
scripts/version.pyexecutes thegitcommand usingsubprocess.runto compute commit counts. While the implementation uses the safer array-based execution method and hardcoded commands, it establishes a dependency on the system shell and localgitinstallation.
Audit Metadata