chezmoi-sync
Pass
Audited by Gen Agent Trust Hub on Apr 3, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses the Bash tool to execute various chezmoi and git commands to detect drift and sync files. Evidence: Shell commands including
chezmoi status,chezmoi diff, andchezmoi git -- pushin SKILL.md. - [DATA_EXFILTRATION]: The skill pushes local file changes to a remote git repository, which involves transmitting potentially sensitive dotfile content over the network. Evidence:
chezmoi git -- pushin SKILL.md. - [CREDENTIALS_UNSAFE]: The skill accesses the chezmoi configuration file, which often contains sensitive environment details or repository URLs. Evidence: Accesses
~/.config/chezmoi/chezmoi.tomlas mentioned in the notes. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because it ingests and processes untrusted file content during the drift check process.
- Ingestion points: The agent reads the output of
chezmoi diffin Step 1 to identify changes. - Boundary markers: Absent; there are no instructions or delimiters to prevent the agent from following instructions embedded within the file diffs.
- Capability inventory: The skill has access to the
Bashtool for command execution and theEdittool for file modification. - Sanitization: Absent; the content of the drifted files is processed directly by the agent without validation or escaping.
Audit Metadata