x-cmd-git

Fail

Audited by Snyk on Feb 16, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The prompt shows examples that pass API tokens directly as command-line arguments (e.g., x gh --cfg token=<github-token>), which encourages embedding secret values verbatim in generated commands or code and thus requires the model to handle/output secrets directly.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). This skill directly fetches and displays content from public, user-generated code hosting platforms (e.g., commands like "x gh repo clone owner/repo", "x gh search", "x gl repo ls", "x cb pr list" that read repos, issues, PRs, READMEs from GitHub/GitLab/Codeberg/Forgejo), so the agent will ingest untrusted third-party content that could carry indirect prompt injections.
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 16, 2026, 03:45 AM