smart-git-commit
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCOMMAND_EXECUTION
Full Analysis
- [Command Execution] (HIGH): The
scripts/commit.tsfile is vulnerable to shell command injection. The script constructs agit commitcommand using a shell heredoc (cat <<'EOF') to include the commit message. Because the script does not sanitize the input for theEOFdelimiter, a message containingEOFfollowed by a newline and other shell commands will result in those commands being executed by the shell. This occurs in themainfunction where thecmdstring is built and then passed toBun.spawn(lines 209-215).\n- [Unverifiable Dependencies & Remote Code Execution] (MEDIUM): The skill automatically executespnpmscripts (lint,build,generate:docs) defined in the repository'spackage.jsonfile. If an attacker tricks a user into running this skill on a malicious repository, these scripts will execute arbitrary code on the user's machine. While these are documented 'pre-commit checks', the lack of a mandatory confirmation before execution (unless the check fails) poses a risk. This is located inrunPreCommitChecksat line 75.\n- [Indirect Prompt Injection] (LOW): The skill ingests untrusted data fromgit diffoutput to analyze changes and suggest commit types. There is no sanitization or boundary marking for this input, which could allow malicious code within a file being committed to influence the generated commit categorization. This is located inanalyzeChangesat line 125.\n - Ingestion points:
git diffoutput inscripts/commit.ts(lines 53, 62)\n - Boundary markers: Absent\n
- Capability inventory: Shell command execution via
Bun.spawn(line 14)\n - Sanitization: Absent
Recommendations
- AI detected serious security threats
Audit Metadata