mise-configuration

Warn

Audited by Gen Agent Trust Hub on Mar 6, 2026

Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
  • [COMMAND_EXECUTION]: The skill documents and encourages the use of 'mise' Tera templates to execute shell commands via the exec function. Documented examples include executing git rev-parse, doppler secrets, and op read (1Password CLI) to dynamically populate environment variables during environment activation.\n- [COMMAND_EXECUTION]: The skill promotes the use of the _.source directive to execute external bash scripts (e.g., ./scripts/env.sh) as part of the environment configuration process.\n- [DATA_EXFILTRATION]: The skill provides detailed implementation patterns for reading sensitive credential files from the local filesystem. Specifically, it guides users to read GitHub tokens from ~/.claude/.secrets/ using the read_file template function, which exposes sensitive information into the environment variable space.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 6, 2026, 11:53 PM