git-operations
Pass
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill provides instructions for the agent to use command-line tools for version control.
- Uses
gitfor core operations including high-impact commands likegit rebaseandgit filter-branch(file: references/advanced.md, references/troubleshooting.md). - Uses
gh(GitHub CLI) for pull request automation and merging. - References an unknown tool
bdfor task management tasks likebd closeandbd ready(file: SKILL.md). - Includes
bfg(BFG Repo-Cleaner) for purging sensitive data from history. - [PROMPT_INJECTION]: The skill contains instructions that override the agent's default behavior regarding identity and attribution.
- It strictly forbids the use of
Co-Authored-By,Signed-off-by, or mentions likeGenerated with Claude Codein commits and PRs, stating "This rule has no exceptions" (file: SKILL.md). - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection due to its operational dependency on external data.
- Ingestion points: The agent reads and interprets commit messages, branch names, and pull request metadata which are provided by potentially untrusted external users.
- Boundary markers: There are no security delimiters or instructions to ignore embedded prompts within the repository data processed.
- Capability inventory: The agent can perform significant write operations including
git pushandgh pr merge --squash. - Sanitization: No sanitization or validation logic is defined for the content of the git history or PR descriptions before they are processed by the agent.
Audit Metadata