git-submodule

Pass

Audited by Gen Agent Trust Hub on Mar 21, 2026

Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [EXTERNAL_DOWNLOADS]: The skill facilitates downloading content from external Git repositories via standard git clone and git submodule add commands, typically targeting well-known hosting services like GitHub.
  • [COMMAND_EXECUTION]: Employs the Bash tool to execute Git commands for repository management. This includes the git submodule foreach command, which runs specified shell scripts across all submodules.
  • [PROMPT_INJECTION]: The skill handles data from external repositories and configuration files (e.g., .gitmodules), representing a potential surface for indirect prompt injection. \n
  • Ingestion points: Content from external Git repositories and user-supplied repository URLs (SKILL.md). \n
  • Boundary markers: Absent; there are no specific instructions for the agent to isolate or ignore embedded instructions within the submodule content. \n
  • Capability inventory: The agent has access to Bash, Read, and Write tools, allowing it to execute commands and modify files (SKILL.md). \n
  • Sanitization: Absent; the instructions do not include verification or sanitization of external repository content before processing.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 21, 2026, 04:49 AM