jj-vcs
Pass
Audited by Gen Agent Trust Hub on May 16, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The documentation for
jj bisect run(inreferences/bisect.md) andjj util exec(inreferences/util.md) describes subcommands that allow the execution of arbitrary shell commands through the version control interface. - [COMMAND_EXECUTION]: The
jj file chmodcommand (inreferences/file.md) is documented, which enables changing the executable bits of files within a repository. - [COMMAND_EXECUTION]: Examples in several reference files (e.g.,
references/diff.md) demonstrate piping the output ofjjcommands to shell utilities likexargsandperl, highlighting the potential for command-line manipulation. - [PROMPT_INJECTION]: The skill presents an attack surface for indirect prompt injection due to its interaction with external Git repository data.
- Ingestion points: The agent reads untrusted data from the repository via commands like
jj log,jj show, andjj diff(references/log.md, references/show.md, references/diff.md). - Boundary markers: There are no instructions or boundary markers to prevent the agent from treating instructions found in commit messages or diffs as commands.
- Capability inventory: The skill provides capabilities for arbitrary command execution (
jj util exec), network operations (jj git push), and permission changes (jj file chmod). - Sanitization: There are no guidelines for sanitizing or validating repository content before it is processed by the agent.
Audit Metadata