module-sync

Pass

Audited by Gen Agent Trust Hub on Mar 11, 2026

Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill executes git config --file .gitmodules --get-regexp path to identify submodule paths. This command is restricted to the project's local git configuration.
  • [PROMPT_INJECTION]: The skill processes data from the file system which introduces a surface for indirect prompt injection. Ingestion points: Processes content from .gitmodules and directory names in the project root. Boundary markers: No delimiters or instructions are used to prevent the agent from interpreting ingested strings as commands. Capability inventory: The skill can execute shell commands and perform file-write operations to project configuration files in the .idea directory. Sanitization: No specific sanitization of ingested metadata is performed beyond a basic regex filter for PARA folder names.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 11, 2026, 03:40 AM