freeze
Pass
Audited by Gen Agent Trust Hub on May 3, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill instructions require the agent to execute shell commands incorporating user-provided input, such as
cd "<user-provided-path>"when setting the freeze boundary. This pattern lacks explicit instructions for input sanitization, presenting a potential command injection surface. - [COMMAND_EXECUTION]: The skill performs local shell operations to manage state and log usage analytics, including the execution of
git rev-parseand file writes to~/.gstack/analytics/skill-usage.jsonl. - [COMMAND_EXECUTION]: The
bin/check-freeze.shscript executes as a pre-tool hook for 'Edit' and 'Write' operations, employing shell commands and apython3one-liner to parse JSON input and validate file paths against the session boundary.
Audit Metadata