start-right
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- Command Execution (HIGH): The scripts
scripts/init_git_repo.pyandscripts/setup_branch_protection.pyconstruct shell commands using unvalidated command-line arguments and execute them usingsubprocess.run(shell=True). An attacker can provide inputs containing shell metacharacters (e.g.,; rm -rf /) to execute arbitrary code on the host machine. Evidence:cmd = f"gh repo create {repo_name} --{visibility} --source=." \n- **Remote Code Execution (HIGH):** The documentation inreferences/release-strategies.mdencourages a pattern of downloading and immediately executing binaries from GitHub releases usingcurl -L ... | bashorchmod +x, which bypasses security controls and facilitates supply chain attacks. Evidence: Example install commandcurl -L https://github.com/user/repo/releases/download/v1.2.3/app-linux-amd64 -o app && chmod +x app.\n- **Indirect Prompt Injection (HIGH):** The skill is highly vulnerable to indirect prompt injection because it processes untrusted data (like repository and organization names) through a high-privilege shell interface without any sanitization. Mandatory Evidence: Ingestion points:sys.argv[1]ininit_git_repo.pyandsetup_branch_protection.py; Boundary markers: None; Capability inventory:subprocess.run(shell=True), file system write,chmod755; Sanitization: None detected.\n- **Dynamic Execution (MEDIUM):**scripts/setup_git_hooks.pyprogrammatically generates and sets executable permissions on shell scripts (e.g.,.husky/pre-commit). This introduces a risk if the generation logic or inputs are compromised. Evidence:with open(".husky/pre-commit", "w") as f: f.write(hook_content)followed byPath(".husky/pre-commit").chmod(0o755)`."
Recommendations
- AI detected serious security threats
Audit Metadata