context-governor
Pass
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: LOWCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [Command Execution] (LOW): The
scripts/session_checkpoint.pyutility invokes the systemgitbinary using thesubprocessmodule to gather state information. Arguments are hardcoded (e.g.,rev-parse,diff,ls-files) and do not incorporate unvalidated external input, minimizing the risk of shell injection. - [Indirect Prompt Injection] (LOW): The
memory_store.pyscript facilitates a potential vulnerability surface by retrieving user-provided notes into the LLM prompt. Ingestion points:scripts/memory_store.pyaccepts user input via the--noteflag. Boundary markers: Retreived content is returned as bulleted lists without specific delimiters or 'ignore' warnings. Capability inventory: The skill provides no direct execution capabilities for retrieved content; it is restricted to providing context. Sanitization: Retrieval is strictly bounded by character length via the--max-charsflag (default 1200).
Audit Metadata