template
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION] (LOW): The skill is designed to execute shell commands using Bun Shell.
- Evidence:
scripts/main.tsuses the$template literal to rungit logandgrepwith user-provided arguments. - Context: The implementation uses Bun's auto-escaping feature (e.g.,
${query}), which mitigates traditional shell injection where special characters might break out of the command string. - [INDIRECT_PROMPT_INJECTION] (LOW): The skill accepts external arguments (
$ARGUMENTS) and processes them viagrepandgit. - Ingestion Points:
process.argv.slice(2)inscripts/main.tsingests data directly from the agent's prompt interpolation. - Boundary Markers: None present in the current template; input is passed directly to the script.
- Capability Inventory: Subprocess execution via Bun Shell (
$). - Sanitization: Relies on Bun's internal template literal escaping. While this prevents shell-level escaping, it does not prevent the LLM from being influenced by malicious content returned from
git logorgrepresults (Indirect Injection).
Audit Metadata