agent-repo-init
Pass
Audited by Gen Agent Trust Hub on Mar 2, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script executes
git initusingsubprocess.runwith a static argument list. This is a standard operation for repository initialization and is implemented safely to prevent shell injection. - [PROMPT_INJECTION]: The skill has an indirect prompt injection surface as it processes external inputs (CLI arguments) that influence filesystem operations.
- Ingestion points:
scripts/init_project.pyaccepts--project-name,--destination-root, and--template-rootas CLI arguments. - Boundary markers: No specific delimiters are used for these inputs within the script's logic.
- Capability inventory: The script uses
shutil.copytreeto copy directories,Path.write_textto create files, andsubprocess.runto execute git commands. - Sanitization: The
project_nameis validated against a strict alphanumeric regex. Path inputs are resolved using.resolve(), and a check is performed to ensure the destination is not within the template root.
Audit Metadata