modern-git

Fail

Audited by Gen Agent Trust Hub on Mar 29, 2026

Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
  • [REMOTE_CODE_EXECUTION]: The skill provides instructions to execute remote shell scripts using curl | sh and curl | bash for GitButler and Claude Code tools.\n- [REMOTE_CODE_EXECUTION]: Instructions involve downloading external binaries, modifying execution permissions with chmod +x, and running them locally.\n- [COMMAND_EXECUTION]: Suggests using sudo to move binaries into system-wide protected directories like /usr/local/bin/.\n- [COMMAND_EXECUTION]: Performs persistent modifications to the user's environment by editing shell profiles (~/.bashrc, ~/.zshrc) and global Git configurations.\n- [COMMAND_EXECUTION]: The command git maintenance start is used to create persistent background scheduled tasks on the system.\n- [EXTERNAL_DOWNLOADS]: Fetches scripts and binaries from gitbutler.com and claude.ai. Note that claude.ai/install.sh is a non-standard installation path for the tool, which may be misleading.\n- [PROMPT_INJECTION]: Contains deceptive metadata in the form of a future-dated source reference (2026-03-06), which is a technique used to bypass verification or appear more authoritative.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Mar 29, 2026, 08:40 AM