pre-ship-review
Warn
Audited by Gen Agent Trust Hub on Apr 4, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The shell scripts provided in
references/automated-checks.mdare vulnerable to command injection. They use unquoted variables such as$PY_FILESand$CHANGED(which contain output fromgit diff) directly in shell commands likepyright ... $PY_FILESandvulture $PY_FILES. If a repository under review contains files with names crafted to include shell metacharacters (e.g.,; malicious_command ; .py), the agent would execute those commands in its local environment. - [EXTERNAL_DOWNLOADS]: The
references/tool-install-guide.mdfile contains instructions to install several third-party development tools includingpyright,vulture,import-linter,deptry,griffe, andmutmutviapip, andsemgrepviabrew. These are well-known tools hosted on official, trusted package registries.
Audit Metadata