tenzir-ship
Pass
Audited by Gen Agent Trust Hub on Mar 14, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Executes the tenzir-ship tool via uvx to manage changelog entries and coordinate releases.
- [COMMAND_EXECUTION]: Invokes the GitHub CLI (gh) to trigger remote release workflows and monitor their progress.
- [COMMAND_EXECUTION]: Runs a local bash script scripts/detect-change-scope.sh that utilizes git commands to identify modified files.
- [EXTERNAL_DOWNLOADS]: Utilizes uvx to dynamically download and execute the tenzir-ship package from the Python Package Index.
- [PROMPT_INJECTION]: Subject to potential indirect prompt injection when analyzing code changes.
- Ingestion points: Git diff outputs and file contents via scripts/detect-change-scope.sh and references/add-changelog-entry.md.
- Boundary markers: None identified in the instructions.
- Capability inventory: File system writes (temporary description files), git commits/tags/pushes, and GitHub API interactions via gh.
- Sanitization: No explicit sanitization or filtering of the ingested content is performed before processing.
Audit Metadata