ggshield-scanner
Pass
Audited by Gen Agent Trust Hub on Mar 24, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes the
ggshieldandgitbinaries using thesubprocess.runfunction inggshield_skill.py. The implementation uses list-based arguments and does not useshell=True, which effectively prevents command injection vulnerabilities. - [EXTERNAL_DOWNLOADS]: The documentation includes a setup command that downloads a script from
https://molt.bot/install.sh. This is a legitimate part of the Moltbot platform installation process and is not triggered or executed by the skill code itself. - [REMOTE_CODE_EXECUTION]: While an automated scanner detected a piped-to-bash pattern, this pattern is located solely within the documentation as an installation example for the platform. It does not constitute a vulnerability in the skill's operational logic.
- [CREDENTIALS_UNSAFE]: The skill correctly manages the required
GITGUARDIAN_API_KEYby reading it from environment variables and passing it to the CLI tool securely, adhering to best practices by avoiding any hardcoded credentials.
Audit Metadata