git-sync
Pass
Audited by Gen Agent Trust Hub on Feb 26, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The
sync.shscript executes shell commands includinggit add,git commit, andgit pushto perform repository synchronization. It uses a hardcoded path/home/crishaocredits/.openclaw/workspace, which also reveals environment-specific details about the host system.\n- [DATA_EXFILTRATION]: The skill is designed to transmit all files within the workspace directory to a remote GitHub repository. This functionality can lead to the accidental exposure of sensitive files, such as environment variables, secrets, or private keys, if they are not correctly managed via.gitignore.\n- [INDIRECT_PROMPT_INJECTION]: Themessageparameter in thegit_synctool is passed directly to the shell script and used in thegit commit -mcommand. While the variable is double-quoted in the script to prevent simple word splitting, it represents an unvalidated input surface that could be used to inject misleading information into repository logs or influence downstream CI/CD pipelines.
Audit Metadata