github-commit-push
Warn
Audited by Gen Agent Trust Hub on Feb 19, 2026
Risk Level: MEDIUMCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION] (MEDIUM): The script
scripts/commit-and-push.shis vulnerable to shell command injection. The variable$BRANCHis used without double quotes in several commands, includinggit rev-parse origin/$BRANCH,git pull origin $BRANCH, andgit push origin $BRANCH. An attacker could provide a malicious branch name containing shell metacharacters to execute arbitrary code. - [DATA_EXFILTRATION] (LOW): The
SKILL.mddocumentation instructs the agent to interact with the~/.sshdirectory by runningls ~/.ssh/id_*.pubandcat ~/.ssh/id_ed25519.pub. This guidance targets a sensitive credential location, increasing the risk of accidental exposure of private keys. - [Indirect Prompt Injection] (LOW): The skill presents an attack surface for indirect prompt injection via its script parameters. 1. Ingestion points:
COMMIT_MSG,BRANCH, andREMOTE_URLarguments inscripts/commit-and-push.sh. 2. Boundary markers: Absent. 3. Capability inventory: The skill can execute shell commands and perform network operations via Git. 4. Sanitization: Absent for the$BRANCHvariable as noted in the injection finding.
Audit Metadata