local-merge
Pass
Audited by Gen Agent Trust Hub on May 10, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: Input validation for branch names occurs too late in the execution flow. The
BRANCHandTARGETvariables are used ingit fetchandgit rev-listcommands in Phase 1a before thecasevalidation statement in Phase 1b is ever reached. - [COMMAND_EXECUTION]: Shell command injection vulnerability in the
MESSAGEparameter. The commit message input is interpolated into thegit mergecommand in Phase 1b (git -C "$MERGE_DIR" merge FETCH_HEAD -m "$MESSAGE") without any validation for shell metacharacters, allowing an attacker to execute arbitrary commands. - [COMMAND_EXECUTION]: Shell command injection vulnerability in the
PRIMARYparameter. The path provided for the primary worktree is used in multiplegit -C "$PRIMARY"commands throughout Phase 2 without sanitization, which can be exploited to run arbitrary shell commands by crafting the path string.
Audit Metadata