gitnexus-refactoring
Warn
Audited by Gen Agent Trust Hub on Apr 24, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The
mcp.jsonfile configures the agent to download thegitnexuspackage from the npm registry at runtime usingnpx. - [REMOTE_CODE_EXECUTION]: The skill executes external code by running
npx -y gitnexus@latest mcp, which fetches and runs the most recent version of the package without a fixed version pin. - [COMMAND_EXECUTION]: The
gitnexus_renametool provides functionality for automated modification of multiple files in the local filesystem, allowing the agent to perform broad changes to the project. - [COMMAND_EXECUTION]: Instructions in
SKILL.mdsuggest that the user runnpx gitnexus analyzein their terminal, which executes an external binary on the host system. - [PROMPT_INJECTION]: The skill exhibits an attack surface for indirect prompt injection as it processes codebase content (untrusted data) and uses it to generate file modification plans.
- Ingestion points: Codebase analysis tools like
gitnexus_impact,gitnexus_query, andgitnexus_contextread source code from the local environment into the agent context. - Boundary markers: No explicit markers or instructions to ignore embedded commands in the processed code are present.
- Capability inventory: The skill possesses file-write capabilities through
gitnexus_renameand provides terminal execution instructions. - Sanitization: There is no evidence of sanitization or validation of the content read from the codebase before it influences the agent's actions.
Audit Metadata