git-submodule
Pass
Audited by Gen Agent Trust Hub on Mar 21, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill facilitates downloading content from external Git repositories via standard
git cloneandgit submodule addcommands, typically targeting well-known hosting services like GitHub. - [COMMAND_EXECUTION]: Employs the Bash tool to execute Git commands for repository management. This includes the
git submodule foreachcommand, which runs specified shell scripts across all submodules. - [PROMPT_INJECTION]: The skill handles data from external repositories and configuration files (e.g.,
.gitmodules), representing a potential surface for indirect prompt injection. \n - Ingestion points: Content from external Git repositories and user-supplied repository URLs (SKILL.md). \n
- Boundary markers: Absent; there are no specific instructions for the agent to isolate or ignore embedded instructions within the submodule content. \n
- Capability inventory: The agent has access to
Bash,Read, andWritetools, allowing it to execute commands and modify files (SKILL.md). \n - Sanitization: Absent; the instructions do not include verification or sanitization of external repository content before processing.
Audit Metadata